IOC Report
jQ3NFDayJm

loading gif

Files

File Path
Type
Category
Malicious
jQ3NFDayJm
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Windows\SysWOW64\Aabldk32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Aefbqf32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Aelink32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Afkgdh32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Aidobh32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ailjng32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ajjjec32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ajjqmqgl.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ajlfhjbn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ajojhp32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Akcokgql.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Alghniec.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Aljbfgpf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Amcldf32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ameiifeg.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Amkiol32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Apbpjhji.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Apgieg32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Baanabom.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Badaah32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Bajhpc32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Baphfiel.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Bccbfjkm.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Bdkabo32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Bdnngnpc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Beqfpgmi.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Bhfgjioo.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Bhiabhja.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Bmbppkoe.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Bmgikj32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Bmhofc32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Bombon32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Bpkkfq32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Cafglb32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Cbaabn32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Cbjkoi32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Cccfolfa.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Cemjaq32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Cgbcokgg.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Cgfcdokh.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Chbmaj32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Chhmdaph.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Chjnlmda.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Cjojjp32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ckdljm32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Clakkf32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Cmkokg32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Cmmhacal.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Cmoefb32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Cohbjm32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Cokoplnm.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Cpdhdolk.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Cppnhn32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Cqeolm32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Dafpcpme.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Dbagjiik.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Dbhphf32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Dcjjpgaa.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Dddgooib.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ddnmejkm.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Dgibhggn.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Dhjiianf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Dhmfoq32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Dhocdp32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Dkbmhf32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Dkoele32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Dmihma32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Dnjcfdoi.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Docmmc32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Dodmipcd.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Dokhgj32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Domiglci.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Dondlj32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Dqamkq32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Eaqjcdhf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ebgacgaj.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ecglja32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ecjgjl32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ecllamlh.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ecmfegon.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Eddpko32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Edlcpjfa.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ednpeidn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Edqlki32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Eeapjigc.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Efcana32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ejjjedcj.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ekifajpc.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Encamf32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Engkhenj.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Eniqcohl.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Enmknk32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Enmknk32.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Windows\SysWOW64\Epnhmj32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Eqacmgol.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Fbacjbjc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Fbjmjcpl.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Fbjocj32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Fcbfja32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Fdldjhaq.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Febcfckp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Fekmfd32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ffchlo32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Fflljpnc.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ffmfeg32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Fghkmc32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Fifbonoq.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Fjpdni32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Fkchmojh.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Fkoqiobi.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Fmeamaph.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Fnanodfp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Fnjcoo32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Fnkmiofi.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Fnohck32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Foaacm32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Fopjig32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Foqfph32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Fplfki32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Fqjqpp32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Galjgp32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Gbfcph32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Gbipeg32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Gchqcf32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Gdkolaoq.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Geiigbeh.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Gekobloj.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Genbbb32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ggbenh32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ggjbcdlg.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Giamobql.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Gibahklh.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Gidnmk32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Giommjni.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Gjhongok.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Glgafh32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Glgklpcj.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Gljedo32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Gllhcm32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Gmakid32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Gnbnph32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Golngj32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Gopkbc32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Windows\SysWOW64\Gpajjk32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Gpmqolfa.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Gqfpko32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Haiooqfk.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hbbclf32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hbhbbofi.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hcddga32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hchcho32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hcliif32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hdnaik32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Heaepkaj.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Heblggpd.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hedahkgo.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hfknhcaf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hfplhlei.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hglhdg32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hgpoon32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hgqaofhe.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hikbigjf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hiolkefh.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hjfniidf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hkjqjeba.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hkkoqdmp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hloapk32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hmnmcf32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hoeiflna.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Homjaafk.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hpfcejof.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hphpkjlc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hppahlmk.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Hqcomlbp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Iamocmjl.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ibkogn32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ibphfofn.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Iciglbko.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ieiomg32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Iejbnp32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ifcanaen.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Iflknc32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Igiglfjj.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Iibphp32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Iiiqoh32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ikdhblhl.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ilkpkihj.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Imdckjjd.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Imjmel32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Impfdpln.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Inaplpij.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Inbgmhop.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ingcjaio.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Iodlcfjb.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ipdpfhbf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ipdpiheo.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ipfeaa32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ipoden32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Jacaehhi.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Jeoqiq32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Jfebge32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Jfenda32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Jhjmlb32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Jiceolni.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Jiipjfip.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Jjhmem32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Jlclga32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Jlfpghnm.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Jlimmg32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Jlnoca32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Jmclho32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Jmcpkl32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Jofjci32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Jomohnom.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Jopbhd32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Jphbga32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Jpmlbqfp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Jppobf32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Kaigjjqk.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Kcamoc32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Kdjdhipm.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Kefjql32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Kejmae32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Kfkiao32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Kgamdcln.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Kgegkoeh.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Khacmalp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Khmhlo32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Khofgbnc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Kilkncaa.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Kiojlk32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Kiolqecl.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Kjfplj32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Kjkggl32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Kmhigjcm.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Knggaeba.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Knjaiq32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Konhokaj.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Kpnkcdli.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Kpnojmgp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Lbjkckae.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Lcbgfi32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Lceckh32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Lcgpahmc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Lecjmhnq.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Leomgk32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Lgaffm32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Lgbpdadc.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Lgojanmn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Lhhhfbih.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ljbphh32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ljimbj32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Llbhhh32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Llnood32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Lmaaqi32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Lmolop32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Lpbndndh.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Lpdccbgf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Lpgaep32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Lpkigf32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Mafkbeoj.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Magfho32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Majppnhp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Mbpekpdk.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Mdfpjg32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Mejcahjf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Mfpeda32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Mgmfbl32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Mhibdn32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Mhkojn32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Mhoflbja.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Mjdlnhfi.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Mjgichdg.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Mjieig32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Mlihpl32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Mmgiocda.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Mnikde32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Mohkfn32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Mpahpi32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Mpkajllm.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Nbkicbfk.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ncafmodl.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Nchpbl32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ndkkoc32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Nfghhi32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Nggkimpl.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Nhljaibo.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Njlgcl32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Njmgoh32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Njoeophq.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Njplifll.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Nlfalpdi.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Nlfojgba.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Nmenfa32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Nnclcm32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Nnpajnal.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Nooagm32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Nqnfgjlh.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Nqomappc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Obgbhn32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ofdbeobd.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Offokopb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ofmldphm.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ohblco32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ojkdkonc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ojmapnlq.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Okbebenm.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Omoalp32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Onnmfb32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Onqjlb32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Oogkej32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Oollcpnc.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ophcmlpf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Oqcglo32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Oqhpgogi.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Oqkkln32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Pbdepo32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Pdhionab.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Pdlope32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Pfceac32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Pfeafc32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Pfikpo32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Pfnkfdne.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Pfqhkdkc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Phhqek32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Pidiop32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Pigmmehh.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Pihcgoep.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Pijdbj32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Pjgkac32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Pjiqlm32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Pmqiii32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Ppcqpc32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Pqhbdf32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Qappag32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Qhgkff32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Qiecnhac.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Qjcjma32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Qjndnbei.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Qmocigko.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Qoejampk.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
There are 332 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\jQ3NFDayJm.exe
"C:\Users\user\Desktop\jQ3NFDayJm.exe"
malicious
C:\Windows\SysWOW64\Enmknk32.exe
C:\Windows\system32\Enmknk32.exe
malicious
C:\Windows\SysWOW64\Fnohck32.exe
C:\Windows\system32\Fnohck32.exe
malicious
C:\Windows\SysWOW64\Fkchmojh.exe
C:\Windows\system32\Fkchmojh.exe
malicious
C:\Windows\SysWOW64\Fekmfd32.exe
C:\Windows\system32\Fekmfd32.exe
malicious
C:\Windows\SysWOW64\Foaacm32.exe
C:\Windows\system32\Foaacm32.exe
malicious
C:\Windows\SysWOW64\Fmeamaph.exe
C:\Windows\system32\Fmeamaph.exe
malicious
C:\Windows\SysWOW64\Ffmfeg32.exe
C:\Windows\system32\Ffmfeg32.exe
malicious
C:\Windows\SysWOW64\Febcfckp.exe
C:\Windows\system32\Febcfckp.exe
malicious
C:\Windows\SysWOW64\Gbfcph32.exe
C:\Windows\system32\Gbfcph32.exe
malicious
C:\Windows\SysWOW64\Gbipeg32.exe
C:\Windows\system32\Gbipeg32.exe
malicious
C:\Windows\SysWOW64\Gpmqolfa.exe
C:\Windows\system32\Gpmqolfa.exe
malicious
C:\Windows\SysWOW64\Geiigbeh.exe
C:\Windows\system32\Geiigbeh.exe
malicious
C:\Windows\SysWOW64\Gnbnph32.exe
C:\Windows\system32\Gnbnph32.exe
malicious
C:\Windows\SysWOW64\Gpajjk32.exe
C:\Windows\system32\Gpajjk32.exe
malicious
C:\Windows\SysWOW64\Genbbb32.exe
C:\Windows\system32\Genbbb32.exe
malicious
C:\Windows\SysWOW64\Hbbclf32.exe
C:\Windows\system32\Hbbclf32.exe
malicious
C:\Windows\SysWOW64\Hpfcejof.exe
C:\Windows\system32\Hpfcejof.exe
malicious
C:\Windows\SysWOW64\Hphpkjlc.exe
C:\Windows\system32\Hphpkjlc.exe
malicious
C:\Windows\SysWOW64\Hloapk32.exe
C:\Windows\system32\Hloapk32.exe
malicious
C:\Windows\SysWOW64\Iejbnp32.exe
C:\Windows\system32\Iejbnp32.exe
malicious
C:\Windows\SysWOW64\Iflknc32.exe
C:\Windows\system32\Iflknc32.exe
malicious
C:\Windows\SysWOW64\Ipdpfhbf.exe
C:\Windows\system32\Ipdpfhbf.exe
malicious
C:\Windows\SysWOW64\Ilkpkihj.exe
C:\Windows\system32\Ilkpkihj.exe
malicious
C:\Windows\SysWOW64\Imjmel32.exe
C:\Windows\system32\Imjmel32.exe
malicious
C:\Windows\SysWOW64\Ifcanaen.exe
C:\Windows\system32\Ifcanaen.exe
malicious
C:\Windows\SysWOW64\Jfenda32.exe
C:\Windows\system32\Jfenda32.exe
malicious
C:\Windows\SysWOW64\Jopbhd32.exe
C:\Windows\system32\Jopbhd32.exe
malicious
C:\Windows\SysWOW64\Jppobf32.exe
C:\Windows\system32\Jppobf32.exe
malicious
C:\Windows\SysWOW64\Jlfpghnm.exe
C:\Windows\system32\Jlfpghnm.exe
malicious
C:\Windows\SysWOW64\Jlimmg32.exe
C:\Windows\system32\Jlimmg32.exe
malicious
C:\Windows\SysWOW64\Kmhigjcm.exe
C:\Windows\system32\Kmhigjcm.exe
malicious
C:\Windows\SysWOW64\Kiojlk32.exe
C:\Windows\system32\Kiojlk32.exe
malicious
C:\Windows\SysWOW64\Kefjql32.exe
C:\Windows\system32\Kefjql32.exe
malicious
C:\Windows\SysWOW64\Kgegkoeh.exe
C:\Windows\system32\Kgegkoeh.exe
malicious
C:\Windows\SysWOW64\Kpnkcdli.exe
C:\Windows\system32\Kpnkcdli.exe
malicious
C:\Windows\SysWOW64\Kjfplj32.exe
C:\Windows\system32\Kjfplj32.exe
malicious
C:\Windows\SysWOW64\Ljimbj32.exe
C:\Windows\system32\Ljimbj32.exe
malicious
C:\Windows\SysWOW64\Leomgk32.exe
C:\Windows\system32\Leomgk32.exe
malicious
C:\Windows\SysWOW64\Lgojanmn.exe
C:\Windows\system32\Lgojanmn.exe
malicious
C:\Windows\SysWOW64\Lgaffm32.exe
C:\Windows\system32\Lgaffm32.exe
malicious
C:\Windows\SysWOW64\Llnood32.exe
C:\Windows\system32\Llnood32.exe
malicious
C:\Windows\SysWOW64\Ljbphh32.exe
C:\Windows\system32\Ljbphh32.exe
malicious
C:\Windows\SysWOW64\Mjdlnhfi.exe
C:\Windows\system32\Mjdlnhfi.exe
malicious
C:\Windows\SysWOW64\Mjgichdg.exe
C:\Windows\system32\Mjgichdg.exe
malicious
C:\Windows\SysWOW64\Mjieig32.exe
C:\Windows\system32\Mjieig32.exe
malicious
C:\Windows\SysWOW64\Mgmfbl32.exe
C:\Windows\system32\Mgmfbl32.exe
malicious
C:\Windows\SysWOW64\Mohkfn32.exe
C:\Windows\system32\Mohkfn32.exe
malicious
C:\Windows\SysWOW64\Mnikde32.exe
C:\Windows\system32\Mnikde32.exe
malicious
C:\Windows\SysWOW64\Njplifll.exe
C:\Windows\system32\Njplifll.exe
malicious
C:\Windows\SysWOW64\Nchpbl32.exe
C:\Windows\system32\Nchpbl32.exe
malicious
C:\Windows\SysWOW64\Nooagm32.exe
C:\Windows\system32\Nooagm32.exe
malicious
C:\Windows\SysWOW64\Nqomappc.exe
C:\Windows\system32\Nqomappc.exe
malicious
C:\Windows\SysWOW64\Nmenfa32.exe
C:\Windows\system32\Nmenfa32.exe
malicious
C:\Windows\SysWOW64\Oqcglo32.exe
C:\Windows\system32\Oqcglo32.exe
malicious
C:\Windows\SysWOW64\Ophcmlpf.exe
C:\Windows\system32\Ophcmlpf.exe
malicious
C:\Windows\SysWOW64\Oqhpgogi.exe
C:\Windows\system32\Oqhpgogi.exe
malicious
C:\Windows\SysWOW64\Omoalp32.exe
C:\Windows\system32\Omoalp32.exe
malicious
C:\Windows\SysWOW64\Onnmfb32.exe
C:\Windows\system32\Onnmfb32.exe
malicious
C:\Windows\SysWOW64\Onqjlb32.exe
C:\Windows\system32\Onqjlb32.exe
malicious
C:\Windows\SysWOW64\Pjgkac32.exe
C:\Windows\system32\Pjgkac32.exe
malicious
C:\Windows\SysWOW64\Pfnkfdne.exe
C:\Windows\system32\Pfnkfdne.exe
malicious
C:\Windows\SysWOW64\Pfqhkdkc.exe
C:\Windows\system32\Pfqhkdkc.exe
malicious
C:\Windows\SysWOW64\Pfceac32.exe
C:\Windows\system32\Pfceac32.exe
malicious
C:\Windows\SysWOW64\Pfeafc32.exe
C:\Windows\system32\Pfeafc32.exe
malicious
C:\Windows\SysWOW64\Qjcjma32.exe
C:\Windows\system32\Qjcjma32.exe
malicious
C:\Windows\SysWOW64\Qhgkff32.exe
C:\Windows\system32\Qhgkff32.exe
malicious
C:\Windows\SysWOW64\Apbpjhji.exe
C:\Windows\system32\Apbpjhji.exe
malicious
C:\Windows\SysWOW64\Aabldk32.exe
C:\Windows\system32\Aabldk32.exe
malicious
C:\Windows\SysWOW64\Ajjqmqgl.exe
C:\Windows\system32\Ajjqmqgl.exe
malicious
C:\Windows\SysWOW64\Apgieg32.exe
C:\Windows\system32\Apgieg32.exe
malicious
C:\Windows\SysWOW64\Amkiol32.exe
C:\Windows\system32\Amkiol32.exe
malicious
C:\Windows\SysWOW64\Ajojhp32.exe
C:\Windows\system32\Ajojhp32.exe
malicious
C:\Windows\SysWOW64\Bombon32.exe
C:\Windows\system32\Bombon32.exe
malicious
C:\Windows\SysWOW64\Bmbppkoe.exe
C:\Windows\system32\Bmbppkoe.exe
malicious
C:\Windows\SysWOW64\Baphfiel.exe
C:\Windows\system32\Baphfiel.exe
malicious
C:\Windows\SysWOW64\Bmgikj32.exe
C:\Windows\system32\Bmgikj32.exe
malicious
C:\Windows\SysWOW64\Badaah32.exe
C:\Windows\system32\Badaah32.exe
malicious
C:\Windows\SysWOW64\Cohbjm32.exe
C:\Windows\system32\Cohbjm32.exe
malicious
C:\Windows\SysWOW64\Cokoplnm.exe
C:\Windows\system32\Cokoplnm.exe
malicious
C:\Windows\SysWOW64\Cgfcdokh.exe
C:\Windows\system32\Cgfcdokh.exe
malicious
C:\Windows\SysWOW64\Ckdljm32.exe
C:\Windows\system32\Ckdljm32.exe
malicious
C:\Windows\SysWOW64\Chhmdaph.exe
C:\Windows\system32\Chhmdaph.exe
malicious
C:\Windows\SysWOW64\Dhjiianf.exe
C:\Windows\system32\Dhjiianf.exe
malicious
C:\Windows\SysWOW64\Dhmfoq32.exe
C:\Windows\system32\Dhmfoq32.exe
malicious
C:\Windows\SysWOW64\Dhocdp32.exe
C:\Windows\system32\Dhocdp32.exe
malicious
C:\Windows\SysWOW64\Dokhgj32.exe
C:\Windows\system32\Dokhgj32.exe
malicious
C:\Windows\SysWOW64\Dondlj32.exe
C:\Windows\system32\Dondlj32.exe
malicious
C:\Windows\SysWOW64\Encamf32.exe
C:\Windows\system32\Encamf32.exe
malicious
C:\Windows\SysWOW64\Eaqjcdhf.exe
C:\Windows\system32\Eaqjcdhf.exe
malicious
C:\Windows\SysWOW64\Engkhenj.exe
C:\Windows\system32\Engkhenj.exe
malicious
C:\Windows\SysWOW64\Eddpko32.exe
C:\Windows\system32\Eddpko32.exe
malicious
C:\Windows\SysWOW64\Fqjqpp32.exe
C:\Windows\system32\Fqjqpp32.exe
malicious
C:\Windows\SysWOW64\Fbjmjcpl.exe
C:\Windows\system32\Fbjmjcpl.exe
malicious
C:\Windows\SysWOW64\Fnanodfp.exe
C:\Windows\system32\Fnanodfp.exe
malicious
C:\Windows\SysWOW64\Fopjig32.exe
C:\Windows\system32\Fopjig32.exe
malicious
C:\Windows\SysWOW64\Fbacjbjc.exe
C:\Windows\system32\Fbacjbjc.exe
malicious
C:\Windows\SysWOW64\Gqfpko32.exe
C:\Windows\system32\Gqfpko32.exe
malicious
C:\Windows\SysWOW64\Ggbenh32.exe
C:\Windows\system32\Ggbenh32.exe
malicious
C:\Windows\SysWOW64\Gibahklh.exe
C:\Windows\system32\Gibahklh.exe
malicious
C:\Windows\SysWOW64\Gidnmk32.exe
C:\Windows\system32\Gidnmk32.exe
malicious
C:\Windows\SysWOW64\Gekobloj.exe
C:\Windows\system32\Gekobloj.exe
malicious
C:\Windows\SysWOW64\Hglhdg32.exe
C:\Windows\system32\Hglhdg32.exe
malicious
C:\Windows\SysWOW64\Hkjqjeba.exe
C:\Windows\system32\Hkjqjeba.exe
malicious
C:\Windows\SysWOW64\Hgqaofhe.exe
C:\Windows\system32\Hgqaofhe.exe
malicious
C:\Windows\SysWOW64\Hedahkgo.exe
C:\Windows\system32\Hedahkgo.exe
malicious
C:\Windows\SysWOW64\Hbhbbofi.exe
C:\Windows\system32\Hbhbbofi.exe
malicious
C:\Windows\SysWOW64\Ibkogn32.exe
C:\Windows\system32\Ibkogn32.exe
malicious
C:\Windows\SysWOW64\Inaplpij.exe
C:\Windows\system32\Inaplpij.exe
malicious
C:\Windows\SysWOW64\Iiiqoh32.exe
C:\Windows\system32\Iiiqoh32.exe
malicious
C:\Windows\SysWOW64\Ipfeaa32.exe
C:\Windows\system32\Ipfeaa32.exe
malicious
C:\Windows\SysWOW64\Jphbga32.exe
C:\Windows\system32\Jphbga32.exe
malicious
C:\Windows\SysWOW64\Jomohnom.exe
C:\Windows\system32\Jomohnom.exe
malicious
C:\Windows\SysWOW64\Jpmlbqfp.exe
C:\Windows\system32\Jpmlbqfp.exe
malicious
C:\Windows\SysWOW64\Jlclga32.exe
C:\Windows\system32\Jlclga32.exe
malicious
C:\Windows\SysWOW64\Jhjmlb32.exe
C:\Windows\system32\Jhjmlb32.exe
malicious
C:\Windows\SysWOW64\Jacaehhi.exe
C:\Windows\system32\Jacaehhi.exe
malicious
C:\Windows\SysWOW64\Khofgbnc.exe
C:\Windows\system32\Khofgbnc.exe
malicious
C:\Windows\SysWOW64\Khacmalp.exe
C:\Windows\system32\Khacmalp.exe
malicious
C:\Windows\SysWOW64\Konhokaj.exe
C:\Windows\system32\Konhokaj.exe
malicious
C:\Windows\SysWOW64\Kejmae32.exe
C:\Windows\system32\Kejmae32.exe
malicious
C:\Windows\SysWOW64\Lpbndndh.exe
C:\Windows\system32\Lpbndndh.exe
malicious
C:\Windows\SysWOW64\Lcbgfi32.exe
C:\Windows\system32\Lcbgfi32.exe
malicious
C:\Windows\SysWOW64\Lceckh32.exe
C:\Windows\system32\Lceckh32.exe
malicious
C:\Windows\SysWOW64\Lcgpahmc.exe
C:\Windows\system32\Lcgpahmc.exe
malicious
C:\Windows\SysWOW64\Mpkajllm.exe
C:\Windows\system32\Mpkajllm.exe
malicious
C:\Windows\SysWOW64\Mhibdn32.exe
C:\Windows\system32\Mhibdn32.exe
malicious
C:\Windows\SysWOW64\Mhkojn32.exe
C:\Windows\system32\Mhkojn32.exe
malicious
C:\Windows\SysWOW64\Mlihpl32.exe
C:\Windows\system32\Mlihpl32.exe
malicious
C:\Windows\SysWOW64\Njoeophq.exe
C:\Windows\system32\Njoeophq.exe
malicious
C:\Windows\SysWOW64\Nbkicbfk.exe
C:\Windows\system32\Nbkicbfk.exe
malicious
C:\Windows\SysWOW64\Nqnfgjlh.exe
C:\Windows\system32\Nqnfgjlh.exe
malicious
C:\Windows\SysWOW64\Ofmldphm.exe
C:\Windows\system32\Ofmldphm.exe
malicious
C:\Windows\SysWOW64\Ojkdkonc.exe
C:\Windows\system32\Ojkdkonc.exe
malicious
C:\Windows\SysWOW64\Ojmapnlq.exe
C:\Windows\system32\Ojmapnlq.exe
malicious
C:\Windows\SysWOW64\Ofdbeobd.exe
C:\Windows\system32\Ofdbeobd.exe
malicious
C:\Windows\SysWOW64\Offokopb.exe
C:\Windows\system32\Offokopb.exe
malicious
C:\Windows\SysWOW64\Pfikpo32.exe
C:\Windows\system32\Pfikpo32.exe
malicious
C:\Windows\SysWOW64\Pijdbj32.exe
C:\Windows\system32\Pijdbj32.exe
malicious
C:\Windows\SysWOW64\Pjiqlm32.exe
C:\Windows\system32\Pjiqlm32.exe
malicious
C:\Windows\SysWOW64\Pbdepo32.exe
C:\Windows\system32\Pbdepo32.exe
malicious
C:\Windows\SysWOW64\Pqhbdf32.exe
C:\Windows\system32\Pqhbdf32.exe
malicious
C:\Windows\SysWOW64\Qmocigko.exe
C:\Windows\system32\Qmocigko.exe
malicious
C:\Windows\SysWOW64\Qiecnhac.exe
C:\Windows\system32\Qiecnhac.exe
malicious
C:\Windows\SysWOW64\Amcldf32.exe
C:\Windows\system32\Amcldf32.exe
malicious
C:\Windows\SysWOW64\Ameiifeg.exe
C:\Windows\system32\Ameiifeg.exe
malicious
C:\Windows\SysWOW64\Ailjng32.exe
C:\Windows\system32\Ailjng32.exe
malicious
C:\Windows\SysWOW64\Ajlfhjbn.exe
C:\Windows\system32\Ajlfhjbn.exe
malicious
C:\Windows\SysWOW64\Bpkkfq32.exe
C:\Windows\system32\Bpkkfq32.exe
malicious
C:\Windows\SysWOW64\Bajhpc32.exe
C:\Windows\system32\Bajhpc32.exe
malicious
C:\Windows\SysWOW64\Bdkabo32.exe
C:\Windows\system32\Bdkabo32.exe
malicious
C:\Windows\SysWOW64\Bdnngnpc.exe
C:\Windows\system32\Bdnngnpc.exe
malicious
C:\Windows\SysWOW64\Baanabom.exe
C:\Windows\system32\Baanabom.exe
malicious
C:\Windows\SysWOW64\Bmhofc32.exe
C:\Windows\system32\Bmhofc32.exe
malicious
C:\Windows\SysWOW64\Cafglb32.exe
C:\Windows\system32\Cafglb32.exe
malicious
C:\Windows\SysWOW64\Cmmhacal.exe
C:\Windows\system32\Cmmhacal.exe
malicious
C:\Windows\SysWOW64\Cmoefb32.exe
C:\Windows\system32\Cmoefb32.exe
malicious
C:\Windows\SysWOW64\Cppnhn32.exe
C:\Windows\system32\Cppnhn32.exe
malicious
C:\Windows\SysWOW64\Dbagjiik.exe
C:\Windows\system32\Dbagjiik.exe
malicious
C:\Windows\SysWOW64\Dmihma32.exe
C:\Windows\system32\Dmihma32.exe
malicious
C:\Windows\SysWOW64\Dafpcpme.exe
C:\Windows\system32\Dafpcpme.exe
malicious
C:\Windows\SysWOW64\Dkoele32.exe
C:\Windows\system32\Dkoele32.exe
malicious
C:\Windows\SysWOW64\Dcjjpgaa.exe
C:\Windows\system32\Dcjjpgaa.exe
malicious
C:\Windows\SysWOW64\Ecmfegon.exe
C:\Windows\system32\Ecmfegon.exe
malicious
C:\Windows\SysWOW64\Edlcpjfa.exe
C:\Windows\system32\Edlcpjfa.exe
malicious
C:\Windows\SysWOW64\Ednpeidn.exe
C:\Windows\system32\Ednpeidn.exe
malicious
C:\Windows\SysWOW64\Edqlki32.exe
C:\Windows\system32\Edqlki32.exe
malicious
C:\Windows\SysWOW64\Eniqcohl.exe
C:\Windows\system32\Eniqcohl.exe
malicious
C:\Windows\SysWOW64\Fnkmiofi.exe
C:\Windows\system32\Fnkmiofi.exe
malicious
C:\Windows\SysWOW64\Fplfki32.exe
C:\Windows\system32\Fplfki32.exe
malicious
There are 160 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://tat-neftbank.ru/kkq.phphttp://tat-neftbank.ru/wcmd.htmSoftware
unknown
http://tat-neftbank.ru/wcmd.htm
unknown
http://tat-neftbank.ru/kkq.php
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
Web Event Logger
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32
NULL
There are 162 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
42A000
unkown
page read and write
malicious
A5F000
stack
page read and write
48E000
heap
page read and write
42E000
unkown
page execute read
2200000
heap
page read and write
42A000
unkown
page read and write
5DE000
heap
page read and write
470000
heap
page read and write
42A000
unkown
page write copy
1F0000
heap
page read and write
540000
heap
page read and write
430000
heap
page read and write
47E000
stack
page read and write
58E000
stack
page read and write
637000
heap
page read and write
4CE000
stack
page read and write
42A000
unkown
page read and write
401000
unkown
page execute and write copy
9C000
stack
page read and write
500000
heap
page read and write
807000
heap
page read and write
688000
heap
page read and write
63F000
heap
page read and write
64E000
heap
page read and write
2400000
heap
page read and write
42A000
unkown
page read and write
2200000
heap
page read and write
530000
heap
page read and write
5BE000
stack
page read and write
480000
heap
page read and write
500000
heap
page read and write
695000
heap
page read and write
19D000
stack
page read and write
19D000
stack
page read and write
2410000
heap
page read and write
510000
heap
page read and write
42A000
unkown
page read and write
610000
heap
page read and write
401000
unkown
page execute and write copy
47A000
heap
page read and write
430000
heap
page read and write
590000
heap
page read and write
710000
heap
page read and write
42A000
unkown
page write copy
5F7000
heap
page read and write
42A000
unkown
page write copy
730000
heap
page read and write
401000
unkown
page execute and write copy
680000
heap
page read and write
19D000
stack
page read and write
9C000
stack
page read and write
500000
heap
page read and write
44E000
heap
page read and write
9C000
stack
page read and write
497000
heap
page read and write
527000
heap
page read and write
2380000
heap
page read and write
42A000
unkown
page read and write
7BE000
stack
page read and write
42A000
unkown
page read and write
72E000
heap
page read and write
660000
heap
page read and write
68A000
heap
page read and write
42A000
unkown
page read and write
5D0000
heap
page read and write
22E0000
heap
page read and write
9EF000
stack
page read and write
630000
heap
page read and write
2240000
heap
page read and write
9C000
stack
page read and write
19D000
stack
page read and write
19D000
stack
page read and write
63F000
heap
page read and write
657000
heap
page read and write
401000
unkown
page execute and write copy
19D000
stack
page read and write
42A000
unkown
page write copy
9C000
stack
page read and write
8FE000
stack
page read and write
9EF000
stack
page read and write
6B6000
heap
page read and write
5A5000
heap
page read and write
8AF000
stack
page read and write
92E000
stack
page read and write
646000
heap
page read and write
627000
heap
page read and write
42A000
unkown
page read and write
5AE000
stack
page read and write
4D7000
heap
page read and write
618000
heap
page read and write
83F000
heap
page read and write
500000
heap
page read and write
1F0000
heap
page read and write
9DF000
stack
page read and write
2320000
heap
page read and write
742000
heap
page read and write
401000
unkown
page execute and write copy
42E000
unkown
page execute read
19D000
stack
page read and write
617000
heap
page read and write
500000
heap
page read and write
701000
heap
page read and write
5DE000
heap
page read and write
4C0000
heap
page read and write
586000
heap
page read and write
5C0000
heap
page read and write
90F000
stack
page read and write
96F000
stack
page read and write
6B9000
heap
page read and write
1F0000
heap
page read and write
93E000
stack
page read and write
846000
heap
page read and write
42A000
unkown
page read and write
9C000
stack
page read and write
401000
unkown
page execute and write copy
737000
heap
page read and write
487000
heap
page read and write
401000
unkown
page execute and write copy
42A000
unkown
page write copy
65E000
heap
page read and write
42A000
unkown
page read and write
6EE000
heap
page read and write
540000
heap
page read and write
7C1000
heap
page read and write
9C000
stack
page read and write
59A000
heap
page read and write
1F0000
heap
page read and write
19D000
stack
page read and write
2380000
heap
page read and write
640000
heap
page read and write
9EF000
stack
page read and write
5FE000
heap
page read and write
4A6000
heap
page read and write
4D6000
heap
page read and write
5E5000
heap
page read and write
42A000
unkown
page read and write
430000
heap
page read and write
1E0000
heap
page read and write
60E000
stack
page read and write
58E000
stack
page read and write
42A000
unkown
page read and write
590000
heap
page read and write
430000
heap
page read and write
19D000
stack
page read and write
5FF000
heap
page read and write
401000
unkown
page execute and write copy
56A000
heap
page read and write
42E000
unkown
page execute read
19D000
stack
page read and write
42A000
unkown
page write copy
500000
heap
page read and write
5AE000
heap
page read and write
500000
heap
page read and write
69A000
heap
page read and write
1F0000
heap
page read and write
500000
heap
page read and write
4D0000
heap
page read and write
89F000
stack
page read and write
67F000
stack
page read and write
60E000
stack
page read and write
766000
heap
page read and write
42A000
unkown
page read and write
94F000
stack
page read and write
69E000
heap
page read and write
4EA000
heap
page read and write
5DE000
stack
page read and write
500000
heap
page read and write
42A000
unkown
page write copy
496000
heap
page read and write
52F000
heap
page read and write
9C000
stack
page read and write
686000
heap
page read and write
647000
heap
page read and write
646000
heap
page read and write
42A000
unkown
page read and write
7BF000
heap
page read and write
510000
heap
page read and write
401000
unkown
page execute and write copy
9C000
stack
page read and write
A8F000
stack
page read and write
500000
heap
page read and write
42E000
unkown
page execute read
716000
heap
page read and write
657000
heap
page read and write
65E000
stack
page read and write
19D000
stack
page read and write
430000
heap
page read and write
1F0000
heap
page read and write
42A000
unkown
page write copy
7E6000
heap
page read and write
2230000
heap
page read and write
72A000
heap
page read and write
51A000
heap
page read and write
7EF000
stack
page read and write
21F0000
heap
page read and write
9C000
stack
page read and write
42A000
unkown
page read and write
19D000
stack
page read and write
42A000
unkown
page read and write
62A000
heap
page read and write
2360000
heap
page read and write
2230000
heap
page read and write
42A000
unkown
page write copy
42A000
unkown
page write copy
42E000
unkown
page execute read
9C000
stack
page read and write
610000
heap
page read and write
42A000
unkown
page write copy
756000
heap
page read and write
787000
heap
page read and write
1F0000
heap
page read and write
8EE000
stack
page read and write
401000
unkown
page execute and write copy
9C000
stack
page read and write
8CF000
stack
page read and write
7D0000
heap
page read and write
520000
heap
page read and write
710000
heap
page read and write
42E000
unkown
page execute read
19D000
stack
page read and write
687000
heap
page read and write
4DE000
stack
page read and write
401000
unkown
page execute and write copy
42A000
unkown
page write copy
4CE000
heap
page read and write
430000
heap
page read and write
6AE000
stack
page read and write
8CF000
stack
page read and write
90F000
stack
page read and write
66A000
heap
page read and write
5AE000
heap
page read and write
42A000
unkown
page write copy
401000
unkown
page execute and write copy
21F0000
heap
page read and write
6DE000
stack
page read and write
7BE000
heap
page read and write
597000
heap
page read and write
6CE000
stack
page read and write
736000
heap
page read and write
6A7000
heap
page read and write
500000
heap
page read and write
500000
heap
page read and write
46A000
heap
page read and write
440000
heap
page read and write
616000
heap
page read and write
42A000
unkown
page read and write
42A000
unkown
page write copy
5DE000
stack
page read and write
19D000
stack
page read and write
401000
unkown
page execute and write copy
616000
heap
page read and write
9C000
stack
page read and write
49F000
heap
page read and write
540000
heap
page read and write
430000
heap
page read and write
76F000
stack
page read and write
64D000
heap
page read and write
42E000
unkown
page execute read
42A000
unkown
page read and write
4CA000
heap
page read and write
42A000
unkown
page read and write
1E0000
heap
page read and write
401000
unkown
page execute and write copy
2230000
heap
page read and write
4F0000
heap
page read and write
42A000
unkown
page write copy
42E000
unkown
page execute read
71A000
heap
page read and write
42A000
unkown
page write copy
401000
unkown
page execute and write copy
647000
heap
page read and write
4DA000
heap
page read and write
6A6000
heap
page read and write
401000
unkown
page execute and write copy
430000
heap
page read and write
1F0000
heap
page read and write
736000
heap
page read and write
50A000
heap
page read and write
19D000
stack
page read and write
430000
heap
page read and write
591000
heap
page read and write
19D000
stack
page read and write
7AF000
stack
page read and write
5A0000
heap
page read and write
19D000
stack
page read and write
6A0000
heap
page read and write
47E000
stack
page read and write
68A000
heap
page read and write
47A000
heap
page read and write
42A000
unkown
page read and write
19D000
stack
page read and write
9C000
stack
page read and write
725000
heap
page read and write
7DF000
stack
page read and write
42A000
unkown
page write copy
95F000
stack
page read and write
69F000
stack
page read and write
49E000
heap
page read and write
98F000
stack
page read and write
5C7000
heap
page read and write
42A000
unkown
page write copy
8BF000
stack
page read and write
7BE000
heap
page read and write
4E7000
heap
page read and write
42A000
unkown
page read and write
2350000
heap
page read and write
62F000
heap
page read and write
610000
heap
page read and write
5CA000
heap
page read and write
467000
heap
page read and write
19D000
stack
page read and write
5E6000
heap
page read and write
42E000
unkown
page execute read
487000
heap
page read and write
747000
heap
page read and write
2340000
heap
page read and write
90E000
stack
page read and write
1F0000
heap
page read and write
42A000
unkown
page read and write
4B6000
heap
page read and write
54E000
stack
page read and write
6EF000
heap
page read and write
430000
heap
page read and write
6C8000
heap
page read and write
5CF000
heap
page read and write
2210000
heap
page read and write
61E000
heap
page read and write
9C000
stack
page read and write
42E000
unkown
page execute read
500000
heap
page read and write
6CE000
heap
page read and write
42A000
unkown
page read and write
500000
heap
page read and write
42E000
unkown
page execute read
4E8000
heap
page read and write
57A000
heap
page read and write
47E000
stack
page read and write
19D000
stack
page read and write
9C000
stack
page read and write
70F000
heap
page read and write
497000
heap
page read and write
42E000
unkown
page execute read
5E6000
heap
page read and write
42E000
unkown
page execute read
1F0000
heap
page read and write
A1F000
stack
page read and write
19D000
stack
page read and write
401000
unkown
page execute and write copy
510000
heap
page read and write
1F0000
heap
page read and write
19D000
stack
page read and write
1F0000
heap
page read and write
7E5000
heap
page read and write
605000
heap
page read and write
1C0000
heap
page read and write
460000
heap
page read and write
7E1000
heap
page read and write
22E0000
heap
page read and write
19D000
stack
page read and write
42A000
unkown
page read and write
42E000
unkown
page execute read
630000
heap
page read and write
5CE000
stack
page read and write
42E000
unkown
page execute read
430000
heap
page read and write
1D0000
heap
page read and write
42A000
unkown
page write copy
736000
heap
page read and write
19D000
stack
page read and write
42E000
unkown
page execute read
7AE000
heap
page read and write
42A000
unkown
page read and write
9C000
stack
page read and write
6AA000
heap
page read and write
1F0000
heap
page read and write
49A000
heap
page read and write
7F7000
heap
page read and write
401000
unkown
page execute and write copy
520000
heap
page read and write
1F0000
heap
page read and write
6F7000
heap
page read and write
430000
heap
page read and write
9C000
stack
page read and write
401000
unkown
page execute and write copy
19D000
stack
page read and write
866000
heap
page read and write
42A000
unkown
page write copy
696000
heap
page read and write
7CF000
stack
page read and write
430000
heap
page read and write
620000
heap
page read and write
42E000
unkown
page execute read
42A000
unkown
page write copy
9C000
stack
page read and write
42A000
unkown
page write copy
440000
heap
page read and write
6AE000
heap
page read and write
650000
heap
page read and write
746000
heap
page read and write
430000
heap
page read and write
1F0000
heap
page read and write
68A000
heap
page read and write
401000
unkown
page execute and write copy
19D000
stack
page read and write
9C000
stack
page read and write
6C0000
heap
page read and write
6F9000
heap
page read and write
42A000
unkown
page write copy
470000
heap
page read and write
6E0000
heap
page read and write
2390000
heap
page read and write
6C0000
heap
page read and write
5F0000
heap
page read and write
620000
heap
page read and write
19D000
stack
page read and write
A9F000
stack
page read and write
1F0000
heap
page read and write
7BE000
stack
page read and write
42A000
unkown
page read and write
650000
heap
page read and write
2220000
heap
page read and write
5DE000
stack
page read and write
42A000
unkown
page write copy
9C000
stack
page read and write
69F000
stack
page read and write
42A000
unkown
page write copy
2390000
heap
page read and write
9FF000
stack
page read and write
820000
heap
page read and write
755000
heap
page read and write
6EE000
heap
page read and write
1F0000
heap
page read and write
1F0000
heap
page read and write
656000
heap
page read and write
5FE000
heap
page read and write
4A6000
heap
page read and write
500000
heap
page read and write
4D0000
heap
page read and write
6F7000
heap
page read and write
42A000
unkown
page read and write
79F000
stack
page read and write
570000
heap
page read and write
9C000
stack
page read and write
42A000
unkown
page write copy
A1F000
stack
page read and write
8DF000
stack
page read and write
1F0000
heap
page read and write
75F000
stack
page read and write
68A000
heap
page read and write
42A000
unkown
page read and write
470000
heap
page read and write
57F000
heap
page read and write
50A000
heap
page read and write
520000
heap
page read and write
6A5000
heap
page read and write
42A000
unkown
page write copy
42E000
unkown
page execute read
487000
heap
page read and write
67F000
stack
page read and write
23E0000
heap
page read and write
4D0000
heap
page read and write
42E000
unkown
page execute read
430000
heap
page read and write
9C000
stack
page read and write
8EF000
stack
page read and write
500000
heap
page read and write
490000
heap
page read and write
5EE000
stack
page read and write
4E0000
heap
page read and write
1F0000
heap
page read and write
401000
unkown
page execute and write copy
48A000
heap
page read and write
401000
unkown
page execute and write copy
700000
heap
page read and write
42A000
unkown
page write copy
4BE000
stack
page read and write
2420000
heap
page read and write
42E000
unkown
page execute read
5DE000
heap
page read and write
72E000
heap
page read and write
58F000
heap
page read and write
22E0000
heap
page read and write
536000
heap
page read and write
5D0000
heap
page read and write
42A000
unkown
page read and write
6D0000
heap
page read and write
68E000
heap
page read and write
9C000
stack
page read and write
530000
heap
page read and write
8EE000
stack
page read and write
22E0000
heap
page read and write
616000
heap
page read and write
42A000
unkown
page write copy
42E000
unkown
page execute read
5D0000
heap
page read and write
758000
heap
page read and write
2300000
heap
page read and write
5DE000
stack
page read and write
4D0000
heap
page read and write
5FE000
heap
page read and write
430000
heap
page read and write
42A000
unkown
page write copy
5A0000
heap
page read and write
9C000
stack
page read and write
9C000
stack
page read and write
4D8000
heap
page read and write
9C000
stack
page read and write
42A000
unkown
page read and write
542000
heap
page read and write
737000
heap
page read and write
430000
heap
page read and write
42A000
unkown
page read and write
42A000
unkown
page write copy
510000
heap
page read and write
2270000
heap
page read and write
1F0000
heap
page read and write
42E000
unkown
page execute read
440000
heap
page read and write
9C000
stack
page read and write
2320000
heap
page read and write
55E000
stack
page read and write
680000
heap
page read and write
757000
heap
page read and write
42A000
unkown
page read and write
4A0000
heap
page read and write
9C000
stack
page read and write
1F0000
heap
page read and write
767000
heap
page read and write
91F000
stack
page read and write
A1F000
stack
page read and write
88F000
stack
page read and write
42E000
unkown
page execute read
7FF000
stack
page read and write
59E000
stack
page read and write
2230000
heap
page read and write
9C000
stack
page read and write
6A6000
heap
page read and write
77F000
stack
page read and write
42A000
unkown
page read and write
42A000
unkown
page read and write
42E000
unkown
page execute read
5E6000
heap
page read and write
500000
heap
page read and write
42A000
unkown
page write copy
401000
unkown
page execute and write copy
430000
heap
page read and write
42E000
unkown
page execute read
616000
heap
page read and write
517000
heap
page read and write
19D000
stack
page read and write
777000
heap
page read and write
51A000
heap
page read and write
71A000
heap
page read and write
42E000
unkown
page execute read
787000
heap
page read and write
48E000
stack
page read and write
707000
heap
page read and write
42E000
unkown
page execute read
4C6000
heap
page read and write
600000
heap
page read and write
4EE000
heap
page read and write
696000
heap
page read and write
680000
heap
page read and write
500000
heap
page read and write
19D000
stack
page read and write
42A000
unkown
page read and write
7B0000
heap
page read and write
44F000
heap
page read and write
89F000
stack
page read and write
500000
heap
page read and write
610000
heap
page read and write
42A000
unkown
page read and write
607000
heap
page read and write
756000
heap
page read and write
42E000
unkown
page execute read
401000
unkown
page execute and write copy
42E000
unkown
page execute read
7C5000
heap
page read and write
430000
heap
page read and write
430000
heap
page read and write
1F0000
heap
page read and write
50F000
heap
page read and write
9EF000
stack
page read and write
7D0000
heap
page read and write
2350000
heap
page read and write
610000
heap
page read and write
670000
heap
page read and write
81F000
stack
page read and write
42A000
unkown
page read and write
430000
heap
page read and write
19D000
stack
page read and write
42A000
unkown
page write copy
690000
heap
page read and write
72F000
heap
page read and write
5F0000
heap
page read and write
7AE000
stack
page read and write
1F0000
heap
page read and write
5D7000
heap
page read and write
430000
heap
page read and write
500000
heap
page read and write
42E000
unkown
page execute read
527000
heap
page read and write
430000
heap
page read and write
A1F000
stack
page read and write
527000
heap
page read and write
57E000
heap
page read and write
500000
heap
page read and write
72F000
heap
page read and write
720000
heap
page read and write
19D000
stack
page read and write
19D000
stack
page read and write
1F0000
heap
page read and write
1F0000
heap
page read and write
537000
heap
page read and write
4B7000
heap
page read and write
5BE000
heap
page read and write
430000
heap
page read and write
68E000
heap
page read and write
9C000
stack
page read and write
9C000
stack
page read and write
1C0000
heap
page read and write
19D000
stack
page read and write
6DF000
stack
page read and write
6F0000
heap
page read and write
6B5000
heap
page read and write
457000
heap
page read and write
5A0000
heap
page read and write
42A000
unkown
page write copy
1F0000
heap
page read and write
9C000
stack
page read and write
57A000
heap
page read and write
42A000
unkown
page read and write
42E000
unkown
page execute read
520000
heap
page read and write
520000
heap
page read and write
607000
heap
page read and write
560000
heap
page read and write
9C000
stack
page read and write
6C7000
heap
page read and write
42A000
unkown
page write copy
7BE000
stack
page read and write
430000
heap
page read and write
500000
heap
page read and write
8EE000
stack
page read and write
440000
heap
page read and write
1F0000
heap
page read and write
76F000
stack
page read and write
42E000
unkown
page execute read
600000
heap
page read and write
656000
heap
page read and write
A2F000
stack
page read and write
42A000
unkown
page read and write
88F000
stack
page read and write
42A000
unkown
page read and write
536000
heap
page read and write
65F000
stack
page read and write
95F000
stack
page read and write
9C000
stack
page read and write
440000
heap
page read and write
9C000
stack
page read and write
5DA000
heap
page read and write
19D000
stack
page read and write
19D000
stack
page read and write
5FA000
heap
page read and write
72E000
heap
page read and write
71A000
heap
page read and write
42A000
unkown
page write copy
647000
heap
page read and write
59E000
stack
page read and write
46A000
heap
page read and write
19D000
stack
page read and write
42A000
unkown
page read and write
42A000
unkown
page read and write
801000
heap
page read and write
500000
heap
page read and write
5B6000
heap
page read and write
5A0000
heap
page read and write
6D6000
heap
page read and write
677000
heap
page read and write
42E000
unkown
page execute read
5E5000
heap
page read and write
42E000
unkown
page execute read
1F0000
heap
page read and write
85F000
stack
page read and write
42A000
unkown
page read and write
5C7000
heap
page read and write
480000
heap
page read and write
401000
unkown
page execute and write copy
860000
heap
page read and write
600000
heap
page read and write
6EE000
stack
page read and write
9C000
stack
page read and write
6B6000
heap
page read and write
5FE000
stack
page read and write
42A000
unkown
page write copy
68F000
stack
page read and write
9C000
stack
page read and write
42E000
unkown
page execute read
42A000
unkown
page read and write
590000
heap
page read and write
90E000
stack
page read and write
94F000
stack
page read and write
510000
heap
page read and write
42A000
unkown
page read and write
44A000
heap
page read and write
7B0000
heap
page read and write
61E000
heap
page read and write
23C0000
heap
page read and write
53E000
stack
page read and write
1F0000
heap
page read and write
401000
unkown
page execute and write copy
42E000
unkown
page execute read
610000
heap
page read and write
430000
heap
page read and write
496000
heap
page read and write
42E000
unkown
page execute read
6F7000
heap
page read and write
9C000
stack
page read and write
5FA000
heap
page read and write
1F0000
heap
page read and write
680000
heap
page read and write
42E000
unkown
page execute read
6C0000
heap
page read and write
806000
heap
page read and write
5A0000
heap
page read and write
9C000
stack
page read and write
9C000
stack
page read and write
1F0000
heap
page read and write
42E000
unkown
page execute read
5FE000
heap
page read and write
42A000
unkown
page write copy
89F000
stack
page read and write
401000
unkown
page execute and write copy
630000
heap
page read and write
5C0000
heap
page read and write
9C000
stack
page read and write
42A000
unkown
page write copy
9C000
stack
page read and write
737000
heap
page read and write
4AA000
heap
page read and write
590000
heap
page read and write
42A000
unkown
page write copy
47E000
stack
page read and write
1F0000
heap
page read and write
430000
heap
page read and write
22F0000
heap
page read and write
55E000
stack
page read and write
65A000
heap
page read and write
9C000
stack
page read and write
19D000
stack
page read and write
650000
heap
page read and write
5FE000
heap
page read and write
526000
heap
page read and write
71E000
heap
page read and write
4C6000
heap
page read and write
466000
heap
page read and write
42A000
unkown
page write copy
A1F000
stack
page read and write
726000
heap
page read and write
866000
heap
page read and write
582000
heap
page read and write
590000
heap
page read and write
8CF000
stack
page read and write
9EF000
stack
page read and write
42A000
unkown
page read and write
801000
heap
page read and write
708000
heap
page read and write
58E000
stack
page read and write
496000
heap
page read and write
42A000
unkown
page read and write
401000
unkown
page execute and write copy
696000
heap
page read and write
401000
unkown
page execute and write copy
A2F000
stack
page read and write
59E000
stack
page read and write
54E000
stack
page read and write
21F0000
heap
page read and write
5E7000
heap
page read and write
500000
heap
page read and write
4C7000
heap
page read and write
500000
heap
page read and write
401000
unkown
page execute and write copy
54E000
stack
page read and write
500000
heap
page read and write
4BE000
heap
page read and write
42A000
unkown
page write copy
827000
heap
page read and write
1F0000
heap
page read and write
42A000
unkown
page read and write
71E000
heap
page read and write
401000
unkown
page execute and write copy
67E000
heap
page read and write
5EA000
heap
page read and write
6A0000
heap
page read and write
42A000
unkown
page write copy
540000
heap
page read and write
42E000
unkown
page execute read
2310000
heap
page read and write
42E000
unkown
page execute read
57E000
stack
page read and write
55E000
stack
page read and write
401000
unkown
page execute and write copy
6DE000
heap
page read and write
8EE000
stack
page read and write
64F000
heap
page read and write
19D000
stack
page read and write
4AA000
heap
page read and write
8AF000
stack
page read and write
401000
unkown
page execute and write copy
401000
unkown
page execute and write copy
8DE000
stack
page read and write
401000
unkown
page execute and write copy
A0F000
stack
page read and write
9C000
stack
page read and write
42A000
unkown
page read and write
657000
heap
page read and write
21E0000
heap
page read and write
7D7000
heap
page read and write
57E000
stack
page read and write
690000
heap
page read and write
42A000
unkown
page read and write
86F000
stack
page read and write
2300000
heap
page read and write
6FA000
heap
page read and write
401000
unkown
page execute and write copy
8DF000
stack
page read and write
500000
heap
page read and write
727000
heap
page read and write
4BE000
heap
page read and write
64A000
heap
page read and write
66E000
stack
page read and write
42A000
unkown
page write copy
626000
heap
page read and write
42A000
unkown
page read and write
466000
heap
page read and write
8BF000
stack
page read and write
6DE000
stack
page read and write
7BE000
stack
page read and write
42A000
unkown
page read and write
19D000
stack
page read and write
401000
unkown
page execute and write copy
430000
heap
page read and write
90E000
stack
page read and write
85F000
stack
page read and write
69E000
heap
page read and write
401000
unkown
page execute and write copy
9C000
stack
page read and write
54E000
stack
page read and write
5A5000
heap
page read and write
62F000
heap
page read and write
7CF000
stack
page read and write
21F0000
heap
page read and write
9C000
stack
page read and write
4C0000
heap
page read and write
5C6000
heap
page read and write
74E000
heap
page read and write
660000
heap
page read and write
1F0000
heap
page read and write
627000
heap
page read and write
710000
heap
page read and write
616000
heap
page read and write
72F000
heap
page read and write
54E000
stack
page read and write
6BA000
heap
page read and write
401000
unkown
page execute and write copy
710000
heap
page read and write
577000
heap
page read and write
2300000
heap
page read and write
5DE000
stack
page read and write
468000
heap
page read and write
19D000
stack
page read and write
736000
heap
page read and write
19D000
stack
page read and write
7AA000
heap
page read and write
6DE000
heap
page read and write
42A000
unkown
page read and write
8FE000
stack
page read and write
19D000
stack
page read and write
82E000
heap
page read and write
710000
heap
page read and write
456000
heap
page read and write
42E000
unkown
page execute read
1F0000
heap
page read and write
42A000
unkown
page read and write
56E000
heap
page read and write
2210000
heap
page read and write
66A000
heap
page read and write
59E000
stack
page read and write
9EF000
stack
page read and write
42A000
unkown
page read and write
80F000
stack
page read and write
500000
heap
page read and write
71A000
heap
page read and write
23A0000
heap
page read and write
5C0000
heap
page read and write
9C000
stack
page read and write
430000
heap
page read and write
4B6000
heap
page read and write
42A000
unkown
page read and write
19D000
stack
page read and write
42A000
unkown
page read and write
42A000
unkown
page read and write
471000
heap
page read and write
757000
heap
page read and write
6DE000
heap
page read and write
737000
heap
page read and write
A1F000
stack
page read and write
720000
heap
page read and write
527000
heap
page read and write
69E000
heap
page read and write
42A000
unkown
page read and write
22C0000
heap
page read and write
5D0000
heap
page read and write
6D0000
heap
page read and write
6D5000
heap
page read and write
42A000
unkown
page read and write
9C000
stack
page read and write
4F6000
heap
page read and write
646000
heap
page read and write
21D0000
heap
page read and write
1F0000
heap
page read and write
637000
heap
page read and write
550000
heap
page read and write
5D0000
heap
page read and write
9C000
stack
page read and write
5DE000
stack
page read and write
500000
heap
page read and write
401000
unkown
page execute and write copy
4B7000
heap
page read and write
A0F000
stack
page read and write
507000
heap
page read and write
636000
heap
page read and write
4E6000
heap
page read and write
66A000
heap
page read and write
91E000
stack
page read and write
401000
unkown
page execute and write copy
401000
unkown
page execute and write copy
505000
heap
page read and write
9FF000
stack
page read and write
500000
heap
page read and write
6F0000
heap
page read and write
61A000
heap
page read and write
58E000
stack
page read and write
5F6000
heap
page read and write
42A000
unkown
page write copy
A4F000
stack
page read and write
42A000
unkown
page read and write
5F6000
heap
page read and write
4BA000
heap
page read and write
42A000
unkown
page write copy
7C7000
heap
page read and write
48E000
stack
page read and write
7EF000
stack
page read and write
42A000
unkown
page read and write
401000
unkown
page execute and write copy
1F0000
heap
page read and write
42E000
unkown
page execute read
9EF000
stack
page read and write
2200000
heap
page read and write
47A000
heap
page read and write
8FE000
stack
page read and write
19D000
stack
page read and write
680000
heap
page read and write
727000
heap
page read and write
557000
heap
page read and write
456000
heap
page read and write
42E000
unkown
page execute read
720000
heap
page read and write
500000
heap
page read and write
710000
heap
page read and write
42A000
unkown
page read and write
19D000
stack
page read and write
1F0000
heap
page read and write
598000
heap
page read and write
42A000
unkown
page write copy
7B0000
heap
page read and write
620000
heap
page read and write
42E000
unkown
page execute read
42E000
unkown
page execute read
716000
heap
page read and write
1F0000
heap
page read and write
9C000
stack
page read and write
81F000
stack
page read and write
4B0000
heap
page read and write
7CE000
stack
page read and write
6E1000
heap
page read and write
5CE000
stack
page read and write
1F0000
heap
page read and write
691000
heap
page read and write
19D000
stack
page read and write
42E000
unkown
page execute read
5BA000
heap
page read and write
5CE000
stack
page read and write
A0F000
stack
page read and write
6E7000
heap
page read and write
495000
heap
page read and write
456000
heap
page read and write
60F000
heap
page read and write
42E000
unkown
page execute read
535000
heap
page read and write
74A000
heap
page read and write
19D000
stack
page read and write
67F000
stack
page read and write
5CA000
heap
page read and write
500000
heap
page read and write
430000
heap
page read and write
5DE000
heap
page read and write
6A2000
heap
page read and write
9C000
stack
page read and write
7CF000
stack
page read and write
82E000
heap
page read and write
5FE000
heap
page read and write
9C000
stack
page read and write
19D000
stack
page read and write
9C000
stack
page read and write
9C000
stack
page read and write
58E000
stack
page read and write
9FF000
stack
page read and write
5E0000
heap
page read and write
657000
heap
page read and write
19D000
stack
page read and write
8EE000
stack
page read and write
460000
heap
page read and write
500000
heap
page read and write
55E000
stack
page read and write
6E1000
heap
page read and write
6B9000
heap
page read and write
42A000
unkown
page write copy
500000
heap
page read and write
637000
heap
page read and write
521000
heap
page read and write
4BE000
stack
page read and write
99F000
stack
page read and write
1F0000
heap
page read and write
440000
heap
page read and write
22D0000
heap
page read and write
430000
heap
page read and write
58E000
stack
page read and write
440000
heap
page read and write
42A000
unkown
page read and write
61A000
heap
page read and write
42E000
unkown
page execute read
42E000
unkown
page execute read
8FF000
stack
page read and write
401000
unkown
page execute and write copy
511000
heap
page read and write
42E000
unkown
page execute read
68A000
heap
page read and write
4C6000
heap
page read and write
661000
heap
page read and write
9AF000
stack
page read and write
607000
heap
page read and write
54E000
stack
page read and write
19D000
stack
page read and write
401000
unkown
page execute and write copy
19D000
stack
page read and write
7BF000
stack
page read and write
9C000
stack
page read and write
5AA000
heap
page read and write
401000
unkown
page execute and write copy
9C000
stack
page read and write
1F0000
heap
page read and write
48E000
stack
page read and write
19D000
stack
page read and write
42A000
unkown
page write copy
401000
unkown
page execute and write copy
570000
heap
page read and write
22B0000
heap
page read and write
7DF000
stack
page read and write
42A000
unkown
page read and write
47E000
heap
page read and write
42E000
unkown
page execute read
510000
heap
page read and write
42A000
unkown
page write copy
54E000
stack
page read and write
614000
heap
page read and write
590000
heap
page read and write
9C000
stack
page read and write
42E000
unkown
page execute read
58E000
stack
page read and write
42E000
unkown
page execute read
7AF000
stack
page read and write
686000
heap
page read and write
9DF000
stack
page read and write
760000
heap
page read and write
4D6000
heap
page read and write
9C000
stack
page read and write
6A0000
heap
page read and write
736000
heap
page read and write
A0F000
stack
page read and write
8FE000
stack
page read and write
9DF000
stack
page read and write
550000
heap
page read and write
4BE000
heap
page read and write
19D000
stack
page read and write
42E000
unkown
page execute read
1F0000
heap
page read and write
23B0000
heap
page read and write
42A000
unkown
page read and write
9C000
stack
page read and write
81F000
stack
page read and write
430000
heap
page read and write
500000
heap
page read and write
42E000
unkown
page execute read
66A000
heap
page read and write
5A0000
heap
page read and write
19D000
stack
page read and write
70E000
heap
page read and write
91E000
stack
page read and write
66E000
heap
page read and write
6B3000
heap
page read and write
72F000
heap
page read and write
6F7000
heap
page read and write
44A000
heap
page read and write
450000
heap
page read and write
690000
heap
page read and write
707000
heap
page read and write
440000
heap
page read and write
430000
heap
page read and write
7E0000
heap
page read and write
642000
heap
page read and write
710000
heap
page read and write
736000
heap
page read and write
A1F000
stack
page read and write
9C000
stack
page read and write
590000
heap
page read and write
72E000
heap
page read and write
5EF000
heap
page read and write
71E000
heap
page read and write
54E000
stack
page read and write
42A000
unkown
page write copy
710000
heap
page read and write
1F0000
heap
page read and write
9C000
stack
page read and write
1F0000
heap
page read and write
636000
heap
page read and write
51A000
heap
page read and write
4CF000
heap
page read and write
6DE000
stack
page read and write
71A000
heap
page read and write
6AF000
stack
page read and write
44E000
heap
page read and write
19D000
stack
page read and write
90F000
stack
page read and write
42A000
unkown
page read and write
42A000
unkown
page write copy
57A000
heap
page read and write
500000
heap
page read and write
19D000
stack
page read and write
510000
heap
page read and write
69A000
heap
page read and write
63A000
heap
page read and write
460000
heap
page read and write
7C6000
heap
page read and write
42A000
unkown
page write copy
430000
heap
page read and write
638000
heap
page read and write
401000
unkown
page execute and write copy
47E000
stack
page read and write
7CA000
heap
page read and write
19D000
stack
page read and write
536000
heap
page read and write
8AF000
stack
page read and write
67A000
heap
page read and write
721000
heap
page read and write
42E000
unkown
page execute read
19D000
stack
page read and write
42A000
unkown
page read and write
401000
unkown
page execute and write copy
2200000
heap
page read and write
5D7000
heap
page read and write
6B6000
heap
page read and write
570000
heap
page read and write
55E000
stack
page read and write
49A000
heap
page read and write
45F000
heap
page read and write
5E0000
heap
page read and write
5F6000
heap
page read and write
91E000
stack
page read and write
A1F000
stack
page read and write
4A0000
heap
page read and write
4A7000
heap
page read and write
520000
heap
page read and write
546000
heap
page read and write
42E000
unkown
page execute read
42E000
unkown
page execute read
6FE000
stack
page read and write
694000
heap
page read and write
9C000
stack
page read and write
6EE000
heap
page read and write
635000
heap
page read and write
5B0000
heap
page read and write
52F000
heap
page read and write
4FA000
heap
page read and write
500000
heap
page read and write
661000
heap
page read and write
401000
unkown
page execute and write copy
401000
unkown
page execute and write copy
19D000
stack
page read and write
1F0000
heap
page read and write
642000
heap
page read and write
42A000
unkown
page write copy
55A000
heap
page read and write
42E000
unkown
page execute read
6B5000
heap
page read and write
6C7000
heap
page read and write
6A5000
heap
page read and write
1F0000
heap
page read and write
401000
unkown
page execute and write copy
6F5000
heap
page read and write
7D7000
heap
page read and write
94F000
stack
page read and write
57E000
stack
page read and write
1F0000
heap
page read and write
54E000
stack
page read and write
622000
heap
page read and write
42E000
unkown
page execute read
4A1000
heap
page read and write
1F0000
heap
page read and write
1F0000
heap
page read and write
9C000
stack
page read and write
430000
heap
page read and write
610000
heap
page read and write
401000
unkown
page execute and write copy
675000
heap
page read and write
710000
heap
page read and write
430000
heap
page read and write
66A000
heap
page read and write
42E000
unkown
page execute read
60F000
heap
page read and write
A6F000
stack
page read and write
590000
heap
page read and write
42A000
unkown
page read and write
4AE000
heap
page read and write
9C000
stack
page read and write
6F6000
heap
page read and write
9EF000
stack
page read and write
5C4000
heap
page read and write
430000
heap
page read and write
6F0000
heap
page read and write
748000
heap
page read and write
8CF000
stack
page read and write
500000
heap
page read and write
5DE000
stack
page read and write
6B6000
heap
page read and write
9C000
stack
page read and write
8FE000
stack
page read and write
9C000
stack
page read and write
19D000
stack
page read and write
7EF000
stack
page read and write
42E000
unkown
page execute read
A0F000
stack
page read and write
19D000
stack
page read and write
42A000
unkown
page write copy
1F0000
heap
page read and write
6BE000
stack
page read and write
401000
unkown
page execute and write copy
59E000
heap
page read and write
42E000
unkown
page execute read
42A000
unkown
page read and write
92E000
stack
page read and write
5E0000
heap
page read and write
89F000
stack
page read and write
42A000
unkown
page write copy
19D000
stack
page read and write
42A000
unkown
page write copy
4BE000
stack
page read and write
54E000
stack
page read and write
67E000
heap
page read and write
401000
unkown
page execute and write copy
745000
heap
page read and write
506000
heap
page read and write
637000
heap
page read and write
610000
heap
page read and write
550000
heap
page read and write
6D6000
heap
page read and write
510000
heap
page read and write
69E000
heap
page read and write
42E000
unkown
page execute read
9DF000
stack
page read and write
401000
unkown
page execute and write copy
640000
heap
page read and write
9C000
stack
page read and write
4AE000
heap
page read and write
720000
heap
page read and write
4CE000
heap
page read and write
5F7000
heap
page read and write
7F7000
heap
page read and write
626000
heap
page read and write
670000
heap
page read and write
756000
heap
page read and write
5D0000
heap
page read and write
510000
heap
page read and write
4C0000
heap
page read and write
9C000
stack
page read and write
47E000
stack
page read and write
401000
unkown
page execute and write copy
42A000
unkown
page write copy
69E000
stack
page read and write
42E000
unkown
page execute read
467000
heap
page read and write
6B5000
heap
page read and write
5E0000
heap
page read and write
42E000
unkown
page execute read
42A000
unkown
page write copy
49E000
heap
page read and write
401000
unkown
page execute and write copy
4A8000
heap
page read and write
2390000
heap
page read and write
58E000
heap
page read and write
42E000
unkown
page execute read
42A000
unkown
page read and write
75A000
heap
page read and write
430000
heap
page read and write
95F000
stack
page read and write
70F000
stack
page read and write
5CE000
stack
page read and write
4B0000
heap
page read and write
9C000
stack
page read and write
21B0000
heap
page read and write
1D0000
heap
page read and write
647000
heap
page read and write
6E6000
heap
page read and write
7AF000
stack
page read and write
7A0000
heap
page read and write
6B0000
heap
page read and write
9FF000
stack
page read and write
8DF000
stack
page read and write
42A000
unkown
page write copy
42E000
unkown
page execute read
627000
heap
page read and write
54E000
stack
page read and write
42A000
unkown
page read and write
42A000
unkown
page read and write
85F000
stack
page read and write
657000
heap
page read and write
71A000
heap
page read and write
5A0000
heap
page read and write
42E000
unkown
page execute read
19D000
stack
page read and write
42A000
unkown
page write copy
42A000
unkown
page write copy
42A000
unkown
page read and write
765000
heap
page read and write
8DF000
stack
page read and write
630000
heap
page read and write
401000
unkown
page execute and write copy
1F0000
heap
page read and write
730000
heap
page read and write
6A0000
heap
page read and write
42E000
unkown
page execute read
7AF000
stack
page read and write
590000
heap
page read and write
527000
heap
page read and write
1F0000
heap
page read and write
5AE000
heap
page read and write
731000
heap
page read and write
5DE000
heap
page read and write
42A000
unkown
page read and write
A3F000
stack
page read and write
1F0000
heap
page read and write
401000
unkown
page execute and write copy
42E000
unkown
page execute read
730000
heap
page read and write
687000
heap
page read and write
9C000
stack
page read and write
401000
unkown
page execute and write copy
69E000
stack
page read and write
22E0000
heap
page read and write
401000
unkown
page execute and write copy
4BA000
heap
page read and write
42A000
unkown
page write copy
5F8000
heap
page read and write
4A0000
heap
page read and write
500000
heap
page read and write
42A000
unkown
page write copy
706000
heap
page read and write
646000
heap
page read and write
67F000
heap
page read and write
401000
unkown
page execute and write copy
2420000
heap
page read and write
717000
heap
page read and write
6EA000
heap
page read and write
42E000
unkown
page execute read
57A000
heap
page read and write
42E000
unkown
page execute read
57E000
heap
page read and write
42A000
unkown
page read and write
4B6000
heap
page read and write
507000
heap
page read and write
1F0000
heap
page read and write
8CF000
stack
page read and write
42E000
unkown
page execute read
66A000
heap
page read and write
42A000
unkown
page write copy
19D000
stack
page read and write
401000
unkown
page execute and write copy
6BE000
heap
page read and write
4DF000
heap
page read and write
4F0000
heap
page read and write
9C000
stack
page read and write
666000
heap
page read and write
42A000
unkown
page write copy
19D000
stack
page read and write
7EF000
stack
page read and write
4CE000
stack
page read and write
42A000
unkown
page read and write
401000
unkown
page execute and write copy
1C0000
heap
page read and write
4EF000
heap
page read and write
5D0000
heap
page read and write
6AE000
heap
page read and write
42E000
unkown
page execute read
727000
heap
page read and write
440000
heap
page read and write
A5F000
stack
page read and write
42A000
unkown
page read and write
A2F000
stack
page read and write
59E000
stack
page read and write
9C000
stack
page read and write
42A000
unkown
page read and write
658000
heap
page read and write
63A000
heap
page read and write
750000
heap
page read and write
500000
heap
page read and write
690000
heap
page read and write
730000
heap
page read and write
47E000
stack
page read and write
19D000
stack
page read and write
610000
heap
page read and write
401000
unkown
page execute and write copy
550000
heap
page read and write
6A0000
heap
page read and write
5FE000
stack
page read and write
42E000
unkown
page execute read
19D000
stack
page read and write
71A000
heap
page read and write
71A000
heap
page read and write
610000
heap
page read and write
470000
heap
page read and write
6AE000
heap
page read and write
401000
unkown
page execute and write copy
80F000
stack
page read and write
5EE000
heap
page read and write
42A000
unkown
page write copy
75F000
stack
page read and write
42A000
unkown
page write copy
A1F000
stack
page read and write
89F000
stack
page read and write
430000
heap
page read and write
42A000
unkown
page write copy
590000
heap
page read and write
430000
heap
page read and write
496000
heap
page read and write
42E000
unkown
page execute read
9EF000
stack
page read and write
42E000
unkown
page execute read
9C000
stack
page read and write
480000
heap
page read and write
9C000
stack
page read and write
430000
heap
page read and write
5DE000
stack
page read and write
5B8000
heap
page read and write
19D000
stack
page read and write
430000
heap
page read and write
785000
heap
page read and write
6EE000
stack
page read and write
2290000
heap
page read and write
42A000
unkown
page write copy
42E000
unkown
page execute read
5FE000
heap
page read and write
490000
heap
page read and write
42A000
unkown
page write copy
7D7000
heap
page read and write
9C000
stack
page read and write
2280000
heap
page read and write
696000
heap
page read and write
430000
heap
page read and write
42A000
unkown
page read and write
42E000
unkown
page execute read
58E000
stack
page read and write
59E000
heap
page read and write
736000
heap
page read and write
5FE000
stack
page read and write
4B0000
heap
page read and write
69A000
heap
page read and write
2310000
heap
page read and write
401000
unkown
page execute and write copy
610000
heap
page read and write
1F0000
heap
page read and write
42E000
unkown
page execute read
42E000
unkown
page execute read
620000
heap
page read and write
606000
heap
page read and write
430000
heap
page read and write
7EF000
stack
page read and write
8FE000
stack
page read and write
627000
heap
page read and write
19D000
stack
page read and write
721000
heap
page read and write
42A000
unkown
page write copy
46E000
heap
page read and write
5C0000
heap
page read and write
1F0000
heap
page read and write
5EE000
stack
page read and write
42A000
unkown
page read and write
757000
heap
page read and write
42A000
unkown
page read and write
84F000
stack
page read and write
401000
unkown
page execute and write copy
60A000
heap
page read and write
19D000
stack
page read and write
510000
heap
page read and write
19D000
stack
page read and write
401000
unkown
page execute and write copy
61A000
heap
page read and write
430000
heap
page read and write
500000
heap
page read and write
59A000
heap
page read and write
1F0000
heap
page read and write
6FF000
stack
page read and write
767000
heap
page read and write
9C000
stack
page read and write
660000
heap
page read and write
4A0000
heap
page read and write
9C000
stack
page read and write
560000
heap
page read and write
430000
heap
page read and write
44A000
heap
page read and write
6D0000
heap
page read and write
5F0000
heap
page read and write
430000
heap
page read and write
2360000
heap
page read and write
9C000
stack
page read and write
6F8000
heap
page read and write
430000
heap
page read and write
9C000
stack
page read and write
9C000
stack
page read and write
785000
heap
page read and write
19D000
stack
page read and write
42A000
unkown
page read and write
2370000
heap
page read and write
401000
unkown
page execute and write copy
636000
heap
page read and write
4D7000
heap
page read and write
5CE000
heap
page read and write
4BE000
stack
page read and write
6F0000
heap
page read and write
1F0000
heap
page read and write
72A000
heap
page read and write
476000
heap
page read and write
42A000
unkown
page write copy
601000
heap
page read and write
5F6000
heap
page read and write
686000
heap
page read and write
440000
heap
page read and write
42E000
unkown
page execute read
5C0000
heap
page read and write
4DF000
heap
page read and write
9C000
stack
page read and write
42E000
unkown
page execute read
5B6000
heap
page read and write
1F0000
heap
page read and write
42A000
unkown
page write copy
401000
unkown
page execute and write copy
42A000
unkown
page write copy
4B0000
heap
page read and write
7D6000
heap
page read and write
1F0000
heap
page read and write
1F0000
heap
page read and write
42A000
unkown
page read and write
19D000
stack
page read and write
9DF000
stack
page read and write
6EA000
heap
page read and write
42E000
unkown
page execute read
587000
heap
page read and write
526000
heap
page read and write
42A000
unkown
page write copy
430000
heap
page read and write
5F6000
heap
page read and write
9BF000
stack
page read and write
635000
heap
page read and write
42E000
unkown
page execute read
500000
heap
page read and write
42A000
unkown
page read and write
42A000
unkown
page read and write
19D000
stack
page read and write
636000
heap
page read and write
401000
unkown
page execute and write copy
42A000
unkown
page read and write
9C000
stack
page read and write
497000
heap
page read and write
47E000
stack
page read and write
401000
unkown
page execute and write copy
5F0000
heap
page read and write
4FF000
heap
page read and write
42A000
unkown
page write copy
42E000
unkown
page execute read
5CE000
stack
page read and write
9C000
stack
page read and write
6B0000
heap
page read and write
4E7000
heap
page read and write
500000
heap
page read and write
8CF000
stack
page read and write
6EA000
heap
page read and write
19D000
stack
page read and write
401000
unkown
page execute and write copy
42A000
unkown
page write copy
42E000
unkown
page execute read
468000
heap
page read and write
9C000
stack
page read and write
730000
heap
page read and write
9C000
stack
page read and write
19D000
stack
page read and write
9C000
stack
page read and write
620000
heap
page read and write
23B0000
heap
page read and write
2360000
heap
page read and write
510000
heap
page read and write
62A000
heap
page read and write
42A000
unkown
page read and write
1F0000
heap
page read and write
5CE000
stack
page read and write
74F000
heap
page read and write
54E000
stack
page read and write
49E000
heap
page read and write
54E000
stack
page read and write
866000
heap
page read and write
42A000
unkown
page write copy
401000
unkown
page execute and write copy
430000
heap
page read and write
1F0000
heap
page read and write
7EA000
heap
page read and write
5F0000
heap
page read and write
42E000
unkown
page execute read
740000
heap
page read and write
401000
unkown
page execute and write copy
42E000
unkown
page execute read
6D0000
heap
page read and write
7A0000
heap
page read and write
401000
unkown
page execute and write copy
8BF000
stack
page read and write
500000
heap
page read and write
8CF000
stack
page read and write
8FF000
stack
page read and write
6B0000
heap
page read and write
1F0000
heap
page read and write
1F0000
heap
page read and write
79E000
stack
page read and write
401000
unkown
page execute and write copy
19D000
stack
page read and write
59E000
stack
page read and write
401000
unkown
page execute and write copy
19D000
stack
page read and write
5DE000
stack
page read and write
42E000
unkown
page execute read
6D7000
heap
page read and write
89F000
heap
page read and write
480000
heap
page read and write
4A6000
heap
page read and write
42E000
unkown
page execute read
1F0000
heap
page read and write
401000
unkown
page execute and write copy
90E000
stack
page read and write
22A0000
heap
page read and write
637000
heap
page read and write
6C1000
heap
page read and write
508000
heap
page read and write
5C0000
heap
page read and write
9C000
stack
page read and write
42A000
unkown
page write copy
401000
unkown
page execute and write copy
42A000
unkown
page read and write
500000
heap
page read and write
19D000
stack
page read and write
42E000
unkown
page execute read
7EF000
stack
page read and write
510000
heap
page read and write
42A000
unkown
page read and write
2320000
heap
page read and write
638000
heap
page read and write
60E000
stack
page read and write
54E000
stack
page read and write
620000
heap
page read and write
687000
heap
page read and write
730000
heap
page read and write
5E0000
heap
page read and write
42A000
unkown
page write copy
401000
unkown
page execute and write copy
74E000
heap
page read and write
697000
heap
page read and write
42A000
unkown
page read and write
827000
heap
page read and write
42A000
unkown
page read and write
9C000
stack
page read and write
7CE000
stack
page read and write
64A000
heap
page read and write
4B7000
heap
page read and write
9C000
stack
page read and write
4E0000
heap
page read and write
19D000
stack
page read and write
401000
unkown
page execute and write copy
677000
heap
page read and write
42A000
unkown
page read and write
8EF000
stack
page read and write
536000
heap
page read and write
8AF000
stack
page read and write
42A000
unkown
page read and write
19D000
stack
page read and write
8DE000
stack
page read and write
6FE000
heap
page read and write
430000
heap
page read and write
56E000
stack
page read and write
5A0000
heap
page read and write
500000
heap
page read and write
620000
heap
page read and write
21A0000
heap
page read and write
19D000
stack
page read and write
1D0000
heap
page read and write
69E000
heap
page read and write
19D000
stack
page read and write
521000
heap
page read and write
58E000
stack
page read and write
617000
heap
page read and write
401000
unkown
page execute and write copy
401000
unkown
page execute and write copy
49A000
heap
page read and write
42A000
unkown
page write copy
51E000
heap
page read and write
6A6000
heap
page read and write
60E000
heap
page read and write
686000
heap
page read and write
617000
heap
page read and write
647000
heap
page read and write
440000
heap
page read and write
9C000
stack
page read and write
636000
heap
page read and write
42E000
unkown
page execute read
727000
heap
page read and write
670000
heap
page read and write
9C000
stack
page read and write
6F7000
heap
page read and write
556000
heap
page read and write
42A000
unkown
page read and write
508000
heap
page read and write
4B6000
heap
page read and write
42E000
unkown
page execute read
555000
heap
page read and write
526000
heap
page read and write
466000
heap
page read and write
9C000
stack
page read and write
5C0000
heap
page read and write
2340000
heap
page read and write
700000
heap
page read and write
19D000
stack
page read and write
510000
heap
page read and write
1F0000
heap
page read and write
42A000
unkown
page read and write
6E0000
heap
page read and write
2300000
heap
page read and write
401000
unkown
page execute and write copy
6D7000
heap
page read and write
1F0000
heap
page read and write
500000
heap
page read and write
19D000
stack
page read and write
7C0000
heap
page read and write
42E000
unkown
page execute read
8EF000
stack
page read and write
2220000
heap
page read and write
4A0000
heap
page read and write
60A000
heap
page read and write
8DF000
stack
page read and write
1F0000
heap
page read and write
520000
heap
page read and write
7DA000
heap
page read and write
5FA000
heap
page read and write
440000
heap
page read and write
470000
heap
page read and write
5D0000
heap
page read and write
4C6000
heap
page read and write
401000
unkown
page execute and write copy
6A0000
heap
page read and write
19D000
stack
page read and write
8DE000
stack
page read and write
9C000
stack
page read and write
401000
unkown
page execute and write copy
42A000
unkown
page read and write
42E000
unkown
page execute read
42A000
unkown
page write copy
597000
heap
page read and write
6B1000
heap
page read and write
476000
heap
page read and write
42A000
unkown
page read and write
1F0000
heap
page read and write
9C000
stack
page read and write
AAF000
stack
page read and write
720000
heap
page read and write
597000
heap
page read and write
42E000
unkown
page execute read
54E000
stack
page read and write
21F0000
heap
page read and write
6A1000
heap
page read and write
70E000
stack
page read and write
5CE000
stack
page read and write
1F0000
heap
page read and write
692000
heap
page read and write
42A000
unkown
page read and write
A0F000
stack
page read and write
23A0000
heap
page read and write
7AA000
heap
page read and write
401000
unkown
page execute and write copy
2190000
heap
page read and write
5B0000
heap
page read and write
430000
heap
page read and write
470000
heap
page read and write
42A000
unkown
page write copy
19D000
stack
page read and write
430000
heap
page read and write
42A000
unkown
page write copy
700000
heap
page read and write
90F000
stack
page read and write
69F000
stack
page read and write
68F000
stack
page read and write
560000
heap
page read and write
42A000
unkown
page write copy
21E0000
heap
page read and write
401000
unkown
page execute and write copy
42E000
unkown
page execute read
617000
heap
page read and write
9C000
stack
page read and write
457000
heap
page read and write
42E000
unkown
page execute read
42E000
unkown
page execute read
9C000
stack
page read and write
401000
unkown
page execute and write copy
55E000
stack
page read and write
9C000
stack
page read and write
61A000
heap
page read and write
627000
heap
page read and write
6A0000
heap
page read and write
90E000
stack
page read and write
1F0000
heap
page read and write
42E000
unkown
page execute read
6D0000
heap
page read and write
91F000
stack
page read and write
2340000
heap
page read and write
691000
heap
page read and write
4A6000
heap
page read and write
4A0000
heap
page read and write
42A000
unkown
page read and write
430000
heap
page read and write
5DE000
stack
page read and write
500000
heap
page read and write
63A000
heap
page read and write
5F0000
heap
page read and write
9C000
stack
page read and write
4C0000
heap
page read and write
7EA000
heap
page read and write
61E000
stack
page read and write
507000
heap
page read and write
596000
heap
page read and write
610000
heap
page read and write
47E000
stack
page read and write
19D000
stack
page read and write
19D000
stack
page read and write
401000
unkown
page execute and write copy
42A000
unkown
page read and write
9C000
stack
page read and write
42A000
unkown
page write copy
71E000
heap
page read and write
7AE000
stack
page read and write
667000
heap
page read and write
510000
heap
page read and write
726000
heap
page read and write
42A000
unkown
page write copy
795000
heap
page read and write
19D000
stack
page read and write
500000
heap
page read and write
757000
heap
page read and write
91E000
stack
page read and write
4E0000
heap
page read and write
47A000
heap
page read and write
646000
heap
page read and write
21C0000
heap
page read and write
401000
unkown
page execute and write copy
2200000
heap
page read and write
19D000
stack
page read and write
42E000
unkown
page execute read
72A000
heap
page read and write
46E000
heap
page read and write
55E000
stack
page read and write
42E000
unkown
page execute read
A8F000
stack
page read and write
430000
heap
page read and write
2350000
heap
page read and write
42A000
unkown
page read and write
5E8000
heap
page read and write
500000
heap
page read and write
401000
unkown
page execute and write copy
9C000
stack
page read and write
5F0000
heap
page read and write
42A000
unkown
page read and write
42A000
unkown
page write copy
85F000
stack
page read and write
618000
heap
page read and write
430000
heap
page read and write
1F0000
heap
page read and write
9FF000
stack
page read and write
5C0000
heap
page read and write
42A000
unkown
page read and write
61A000
heap
page read and write
740000
heap
page read and write
746000
heap
page read and write
7BF000
stack
page read and write
456000
heap
page read and write
617000
heap
page read and write
19D000
stack
page read and write
401000
unkown
page execute and write copy
53E000
heap
page read and write
401000
unkown
page execute and write copy
82A000
heap
page read and write
4C0000
heap
page read and write
500000
heap
page read and write
19D000
stack
page read and write
23B0000
heap
page read and write
42E000
unkown
page execute read
607000
heap
page read and write
401000
unkown
page execute and write copy
42A000
unkown
page write copy
68F000
heap
page read and write
42A000
unkown
page write copy
1F0000
heap
page read and write
6DA000
heap
page read and write
19D000
stack
page read and write
8EF000
stack
page read and write
500000
heap
page read and write
42A000
unkown
page write copy
5D6000
heap
page read and write
767000
heap
page read and write
5D0000
heap
page read and write
4B5000
heap
page read and write
42A000
unkown
page read and write
47E000
stack
page read and write
22C0000
heap
page read and write
756000
heap
page read and write
9C000
stack
page read and write
677000
heap
page read and write
806000
heap
page read and write
42E000
unkown
page execute read
4EE000
heap
page read and write
737000
heap
page read and write
9FF000
stack
page read and write
9C000
stack
page read and write
8EE000
stack
page read and write
4A7000
heap
page read and write
73E000
heap
page read and write
2270000
heap
page read and write
6A0000
heap
page read and write
66E000
stack
page read and write
736000
heap
page read and write
401000
unkown
page execute and write copy
5DA000
heap
page read and write
1F0000
heap
page read and write
42A000
unkown
page read and write
765000
heap
page read and write
5D0000
heap
page read and write
61A000
heap
page read and write
8DE000
stack
page read and write
42E000
unkown
page execute read
9C000
stack
page read and write
19D000
stack
page read and write
50E000
stack
page read and write
401000
unkown
page execute and write copy
73A000
heap
page read and write
650000
heap
page read and write
2240000
heap
page read and write
4B0000
heap
page read and write
7E0000
heap
page read and write
42A000
unkown
page write copy
475000
heap
page read and write
4AE000
heap
page read and write
42A000
unkown
page write copy
401000
unkown
page execute and write copy
4B7000
heap
page read and write
677000
heap
page read and write
19D000
stack
page read and write
6D0000
heap
page read and write
500000
heap
page read and write
500000
heap
page read and write
6DA000
heap
page read and write
5CE000
stack
page read and write
6B8000
heap
page read and write
19D000
stack
page read and write
19D000
stack
page read and write
690000
heap
page read and write
5F0000
heap
page read and write
401000
unkown
page execute and write copy
5FE000
heap
page read and write
4B5000
heap
page read and write
646000
heap
page read and write
1F0000
heap
page read and write
7EA000
heap
page read and write
460000
heap
page read and write
7AA000
heap
page read and write
497000
heap
page read and write
56E000
stack
page read and write
5FA000
heap
page read and write
2310000
heap
page read and write
2290000
heap
page read and write
19D000
stack
page read and write
5CE000
heap
page read and write
570000
heap
page read and write
401000
unkown
page execute and write copy
9C000
stack
page read and write
1F0000
heap
page read and write
9C000
stack
page read and write
530000
heap
page read and write
847000
heap
page read and write
401000
unkown
page execute and write copy
66E000
heap
page read and write
1F0000
heap
page read and write
7DF000
stack
page read and write
77F000
stack
page read and write
6D7000
heap
page read and write
42A000
unkown
page read and write
5A0000
heap
page read and write
510000
heap
page read and write
9C000
stack
page read and write
707000
heap
page read and write
500000
heap
page read and write
21C0000
heap
page read and write
68E000
heap
page read and write
1F0000
heap
page read and write
22D0000
heap
page read and write
7BF000
stack
page read and write
637000
heap
page read and write
66F000
stack
page read and write
430000
heap
page read and write
5F0000
heap
page read and write
42A000
unkown
page read and write
505000
heap
page read and write
59E000
heap
page read and write
440000
heap
page read and write
42A000
unkown
page write copy
19D000
stack
page read and write
9C000
stack
page read and write
42A000
unkown
page write copy
1F0000
heap
page read and write
19D000
stack
page read and write
61E000
heap
page read and write
401000
unkown
page execute and write copy
8EF000
stack
page read and write
42A000
unkown
page write copy
9C000
stack
page read and write
19D000
stack
page read and write
9C000
stack
page read and write
5FA000
heap
page read and write
44F000
heap
page read and write
89F000
stack
page read and write
42A000
unkown
page write copy
9DF000
stack
page read and write
570000
heap
page read and write
19D000
stack
page read and write
401000
unkown
page execute and read and write
600000
heap
page read and write
468000
heap
page read and write
1F0000
heap
page read and write
9C000
stack
page read and write
A0F000
stack
page read and write
22F0000
heap
page read and write
9C000
stack
page read and write
5B6000
heap
page read and write
4E4000
heap
page read and write
63A000
heap
page read and write
401000
unkown
page execute and write copy
79E000
stack
page read and write
5FA000
heap
page read and write
620000
heap
page read and write
500000
heap
page read and write
507000
heap
page read and write
9C000
stack
page read and write
540000
heap
page read and write
42A000
unkown
page write copy
45F000
heap
page read and write
1F0000
heap
page read and write
43E000
heap
page read and write
8BF000
stack
page read and write
42A000
unkown
page write copy
6F1000
heap
page read and write
1F0000
heap
page read and write
510000
heap
page read and write
42A000
unkown
page write copy
42E000
unkown
page execute read
9C000
stack
page read and write
5A7000
heap
page read and write
5E0000
heap
page read and write
5E6000
heap
page read and write
490000
heap
page read and write
19D000
stack
page read and write
710000
heap
page read and write
9C000
stack
page read and write
42A000
unkown
page read and write
401000
unkown
page execute and write copy
6CE000
stack
page read and write
1F0000
heap
page read and write
42A000
unkown
page write copy
731000
heap
page read and write
6AA000
heap
page read and write
42A000
unkown
page read and write
616000
heap
page read and write
42A000
unkown
page write copy
500000
heap
page read and write
48A000
heap
page read and write
472000
heap
page read and write
58E000
stack
page read and write
4EA000
heap
page read and write
4B6000
heap
page read and write
42A000
unkown
page write copy
500000
heap
page read and write
42E000
unkown
page execute read
54E000
stack
page read and write
507000
heap
page read and write
58E000
stack
page read and write
4A0000
heap
page read and write
5A0000
heap
page read and write
2350000
heap
page read and write
5BE000
stack
page read and write
42A000
unkown
page write copy
401000
unkown
page execute and write copy
9C000
stack
page read and write
430000
heap
page read and write
1F0000
heap
page read and write
728000
heap
page read and write
5F9000
heap
page read and write
19D000
stack
page read and write
401000
unkown
page execute and write copy
4DE000
heap
page read and write
500000
heap
page read and write
660000
heap
page read and write
401000
unkown
page execute and write copy
42A000
unkown
page read and write
9C000
stack
page read and write
4D7000
heap
page read and write
401000
unkown
page execute and write copy
468000
heap
page read and write
59E000
stack
page read and write
19D000
stack
page read and write
500000
heap
page read and write
58E000
stack
page read and write
637000
heap
page read and write
42A000
unkown
page write copy
9EF000
stack
page read and write
9C000
stack
page read and write
716000
heap
page read and write
9C000
stack
page read and write
59E000
stack
page read and write
791000
heap
page read and write
675000
heap
page read and write
401000
unkown
page execute and write copy
9C000
stack
page read and write
42E000
unkown
page execute read
9C000
stack
page read and write
4E6000
heap
page read and write
6F6000
heap
page read and write
5F0000
heap
page read and write
19D000
stack
page read and write
42A000
unkown
page read and write
761000
heap
page read and write
42A000
unkown
page read and write
4A0000
heap
page read and write
9C000
stack
page read and write
480000
heap
page read and write
57A000
heap
page read and write
401000
unkown
page execute and write copy
19D000
stack
page read and write
82F000
stack
page read and write
1F0000
heap
page read and write
89F000
stack
page read and write
57E000
heap
page read and write
6D1000
heap
page read and write
96F000
stack
page read and write
42A000
unkown
page write copy
1F0000
heap
page read and write
19D000
stack
page read and write
5D0000
heap
page read and write
5FE000
stack
page read and write
620000
heap
page read and write
717000
heap
page read and write
500000
heap
page read and write
1F0000
heap
page read and write
42A000
unkown
page write copy
47E000
heap
page read and write
56A000
heap
page read and write
5B6000
heap
page read and write
6D0000
heap
page read and write
A9F000
stack
page read and write
737000
heap
page read and write
430000
heap
page read and write
19D000
stack
page read and write
51A000
heap
page read and write
7EE000
heap
page read and write
89F000
stack
page read and write
401000
unkown
page execute and write copy
9C000
stack
page read and write
61E000
heap
page read and write
42A000
unkown
page write copy
430000
heap
page read and write
75F000
stack
page read and write
42A000
unkown
page write copy
2310000
heap
page read and write
19D000
stack
page read and write
430000
heap
page read and write
636000
heap
page read and write
6DE000
heap
page read and write
5E8000
heap
page read and write
42A000
unkown
page read and write
1F0000
heap
page read and write
47E000
stack
page read and write
6A7000
heap
page read and write
1E0000
heap
page read and write
42A000
unkown
page read and write
6FE000
heap
page read and write
500000
heap
page read and write
737000
heap
page read and write
5DE000
stack
page read and write
401000
unkown
page execute and write copy
42A000
unkown
page write copy
44E000
heap
page read and write
500000
heap
page read and write
42A000
unkown
page write copy
677000
heap
page read and write
6EE000
stack
page read and write
1F0000
heap
page read and write
42A000
unkown
page read and write
7EE000
heap
page read and write
597000
heap
page read and write
2340000
heap
page read and write
67F000
heap
page read and write
19D000
stack
page read and write
72A000
heap
page read and write
95F000
stack
page read and write
7DF000
stack
page read and write
1D0000
heap
page read and write
42E000
unkown
page execute read
2200000
heap
page read and write
6C7000
heap
page read and write
6C7000
heap
page read and write
19D000
stack
page read and write
4AF000
heap
page read and write
606000
heap
page read and write
5CE000
heap
page read and write
71E000
heap
page read and write
48E000
heap
page read and write
6AA000
heap
page read and write
5EA000
heap
page read and write
430000
heap
page read and write
65A000
heap
page read and write
8EE000
stack
page read and write
42A000
unkown
page read and write
6EA000
heap
page read and write
605000
heap
page read and write
56E000
stack
page read and write
9C000
stack
page read and write
6E0000
heap
page read and write
500000
heap
page read and write
66F000
stack
page read and write
1F0000
heap
page read and write
5CE000
stack
page read and write
B1F000
stack
page read and write
401000
unkown
page execute and write copy
22C0000
heap
page read and write
1F0000
heap
page read and write
550000
heap
page read and write
92E000
stack
page read and write
2260000
heap
page read and write
4F0000
heap
page read and write
8FE000
stack
page read and write
5F0000
heap
page read and write
726000
heap
page read and write
99F000
stack
page read and write
42A000
unkown
page write copy
5F0000
heap
page read and write
7BE000
stack
page read and write
42A000
unkown
page read and write
48E000
stack
page read and write
8BF000
stack
page read and write
5A6000
heap
page read and write
60F000
heap
page read and write
630000
heap
page read and write
640000
heap
page read and write
560000
heap
page read and write
A5F000
stack
page read and write
2340000
heap
page read and write
5F6000
heap
page read and write
6FF000
heap
page read and write
42E000
unkown
page execute read
9C000
stack
page read and write
401000
unkown
page execute and write copy
6DA000
heap
page read and write
42A000
unkown
page read and write
9C000
stack
page read and write
430000
heap
page read and write
610000
heap
page read and write
508000
heap
page read and write
401000
unkown
page execute and write copy
510000
heap
page read and write
8AF000
stack
page read and write
700000
heap
page read and write
430000
heap
page read and write
5BE000
stack
page read and write
42E000
unkown
page execute read
66E000
heap
page read and write
7CF000
heap
page read and write
401000
unkown
page execute and write copy
6B1000
heap
page read and write
45F000
heap
page read and write
19D000
stack
page read and write
1F0000
heap
page read and write
42A000
unkown
page read and write
19D000
stack
page read and write
79F000
stack
page read and write
2370000
heap
page read and write
19D000
stack
page read and write
68F000
stack
page read and write
42A000
unkown
page write copy
1F0000
heap
page read and write
43E000
heap
page read and write
2330000
heap
page read and write
73A000
heap
page read and write
79E000
stack
page read and write
19D000
stack
page read and write
42E000
unkown
page execute read
6DE000
stack
page read and write
678000
heap
page read and write
4FE000
heap
page read and write
708000
heap
page read and write
581000
heap
page read and write
90E000
stack
page read and write
19D000
stack
page read and write
490000
heap
page read and write
1F0000
heap
page read and write
5FE000
heap
page read and write
78F000
stack
page read and write
55E000
stack
page read and write
7C7000
heap
page read and write
506000
heap
page read and write
82A000
heap
page read and write
44A000
heap
page read and write
42A000
unkown
page write copy
6E7000
heap
page read and write
76F000
heap
page read and write
780000
heap
page read and write
4F0000
heap
page read and write
59E000
stack
page read and write
686000
heap
page read and write
5CE000
heap
page read and write
2260000
heap
page read and write
401000
unkown
page execute and write copy
5F7000
heap
page read and write
42E000
unkown
page execute read
610000
heap
page read and write
42E000
unkown
page execute read
42A000
unkown
page write copy
727000
heap
page read and write
706000
heap
page read and write
70A000
heap
page read and write
42E000
unkown
page execute read
9FF000
stack
page read and write
746000
heap
page read and write
688000
heap
page read and write
608000
heap
page read and write
401000
unkown
page execute and write copy
8AF000
stack
page read and write
4F0000
heap
page read and write
807000
heap
page read and write
401000
unkown
page execute and write copy
42A000
unkown
page read and write
47E000
heap
page read and write
42A000
unkown
page write copy
42A000
unkown
page write copy
91E000
stack
page read and write
5CE000
stack
page read and write
570000
heap
page read and write
9DF000
stack
page read and write
637000
heap
page read and write
430000
heap
page read and write
401000
unkown
page execute and write copy
430000
heap
page read and write
9C000
stack
page read and write
8FF000
stack
page read and write
658000
heap
page read and write
47E000
stack
page read and write
401000
unkown
page execute and write copy
2240000
heap
page read and write
62E000
heap
page read and write
401000
unkown
page execute and write copy
42A000
unkown
page read and write
4EA000
heap
page read and write
2300000
heap
page read and write
58E000
stack
page read and write
23B0000
heap
page read and write
6EE000
heap
page read and write
731000
heap
page read and write
401000
unkown
page execute and write copy
42A000
unkown
page read and write
8FE000
stack
page read and write
590000
heap
page read and write
47E000
stack
page read and write
1F0000
heap
page read and write
536000
heap
page read and write
69A000
heap
page read and write
490000
heap
page read and write
747000
heap
page read and write
7E1000
heap
page read and write
9DF000
stack
page read and write
710000
heap
page read and write
9C000
stack
page read and write
92F000
stack
page read and write
42A000
unkown
page read and write
1F0000
heap
page read and write
470000
heap
page read and write
494000
heap
page read and write
9CF000
stack
page read and write
42A000
unkown
page write copy
59E000
stack
page read and write
42A000
unkown
page read and write
500000
heap
page read and write
42E000
unkown
page execute read
42E000
unkown
page execute read
4F7000
heap
page read and write
42A000
unkown
page write copy
5B7000
heap
page read and write
42E000
unkown
page execute read
500000
heap
page read and write
19D000
stack
page read and write
42A000
unkown
page write copy
401000
unkown
page execute and write copy
42E000
unkown
page execute read
7C6000
heap
page read and write
430000
heap
page read and write
5FE000
stack
page read and write
42E000
unkown
page execute read
528000
heap
page read and write
590000
heap
page read and write
5D0000
heap
page read and write
6B7000
heap
page read and write
59E000
stack
page read and write
42E000
unkown
page execute read
6DE000
stack
page read and write
1C0000
heap
page read and write
42E000
unkown
page execute read
567000
heap
page read and write
401000
unkown
page execute and write copy
49F000
heap
page read and write
42A000
unkown
page write copy
71F000
heap
page read and write
58E000
stack
page read and write
42A000
unkown
page read and write
6E0000
heap
page read and write
610000
heap
page read and write
19D000
stack
page read and write
490000
heap
page read and write
42A000
unkown
page read and write
626000
heap
page read and write
756000
heap
page read and write
9DF000
stack
page read and write
19D000
stack
page read and write
9C000
stack
page read and write
42A000
unkown
page read and write
5FA000
heap
page read and write
63E000
heap
page read and write
42E000
unkown
page execute read
70A000
heap
page read and write
2300000
heap
page read and write
42A000
unkown
page read and write
61E000
heap
page read and write
1F0000
heap
page read and write
6E0000
heap
page read and write
4E0000
heap
page read and write
5EE000
stack
page read and write
440000
heap
page read and write
2270000
heap
page read and write
42E000
unkown
page execute read
22E0000
heap
page read and write
740000
heap
page read and write
42A000
unkown
page read and write
19D000
stack
page read and write
42E000
unkown
page execute read
5DE000
heap
page read and write
42E000
unkown
page execute read
4D0000
heap
page read and write
5A5000
heap
page read and write
7AE000
stack
page read and write
42A000
unkown
page write copy
1F0000
heap
page read and write
430000
heap
page read and write
430000
heap
page read and write
590000
heap
page read and write
19D000
stack
page read and write
42A000
unkown
page write copy
430000
heap
page read and write
69F000
heap
page read and write
42A000
unkown
page write copy
4E0000
heap
page read and write
726000
heap
page read and write
766000
heap
page read and write
6A8000
heap
page read and write
91F000
stack
page read and write
42A000
unkown
page read and write
A3F000
stack
page read and write
42A000
unkown
page read and write
8EE000
stack
page read and write
47E000
stack
page read and write
42E000
unkown
page execute read
A0F000
stack
page read and write
730000
heap
page read and write
4D5000
heap
page read and write
9C000
stack
page read and write
43E000
heap
page read and write
48A000
heap
page read and write
6E6000
heap
page read and write
720000
heap
page read and write
42A000
unkown
page read and write
757000
heap
page read and write
5AA000
heap
page read and write
635000
heap
page read and write
1F0000
heap
page read and write
69E000
stack
page read and write
19D000
stack
page read and write
42E000
unkown
page execute read
496000
heap
page read and write
19D000
stack
page read and write
78F000
stack
page read and write
4D7000
heap
page read and write
497000
heap
page read and write
9C000
stack
page read and write
610000
heap
page read and write
710000
heap
page read and write
495000
heap
page read and write
19D000
stack
page read and write
54E000
stack
page read and write
55A000
heap
page read and write
401000
unkown
page execute and write copy
1F0000
heap
page read and write
510000
heap
page read and write
23C0000
heap
page read and write
42E000
unkown
page execute read
401000
unkown
page execute and write copy
4A6000
heap
page read and write
5EF000
heap
page read and write
610000
heap
page read and write
401000
unkown
page execute and write copy
5FE000
stack
page read and write
401000
unkown
page execute and write copy
9C000
stack
page read and write
9C000
stack
page read and write
510000
heap
page read and write
610000
heap
page read and write
19D000
stack
page read and write
520000
heap
page read and write
4B0000
heap
page read and write
1F0000
heap
page read and write
487000
heap
page read and write
59A000
heap
page read and write
2300000
heap
page read and write
42A000
unkown
page write copy
42E000
unkown
page execute read
746000
heap
page read and write
6BA000
heap
page read and write
66E000
heap
page read and write
42E000
unkown
page execute read
710000
heap
page read and write
2390000
heap
page read and write
22C0000
heap
page read and write
600000
heap
page read and write
19D000
stack
page read and write
570000
heap
page read and write
5E0000
heap
page read and write
9DF000
stack
page read and write
1F0000
heap
page read and write
19D000
stack
page read and write
7BF000
stack
page read and write
8CF000
stack
page read and write
5A9000
heap
page read and write
510000
heap
page read and write
1F0000
heap
page read and write
496000
heap
page read and write
73A000
heap
page read and write
2380000
heap
page read and write
42D000
unkown
page read and write
54E000
stack
page read and write
42E000
unkown
page execute read
A6F000
stack
page read and write
5B6000
heap
page read and write
680000
heap
page read and write
5A0000
heap
page read and write
430000
heap
page read and write
42E000
unkown
page execute read
5AE000
stack
page read and write
4B0000
heap
page read and write
A0F000
stack
page read and write
430000
heap
page read and write
72A000
heap
page read and write
7D8000
heap
page read and write
5E5000
heap
page read and write
19D000
stack
page read and write
73F000
heap
page read and write
561000
heap
page read and write
1F0000
heap
page read and write
42A000
unkown
page write copy
6C7000
heap
page read and write
42A000
unkown
page write copy
401000
unkown
page execute and write copy
5BE000
stack
page read and write
75F000
stack
page read and write
42E000
unkown
page execute read
507000
heap
page read and write
687000
heap
page read and write
610000
heap
page read and write
440000
heap
page read and write
6F9000
heap
page read and write
42A000
unkown
page write copy
9DF000
stack
page read and write
19D000
stack
page read and write
2360000
heap
page read and write
1F0000
heap
page read and write
4D6000
heap
page read and write
500000
heap
page read and write
9FF000
stack
page read and write
5FA000
heap
page read and write
8BF000
stack
page read and write
4E6000
heap
page read and write
5C5000
heap
page read and write
19D000
stack
page read and write
21A0000
heap
page read and write
75E000
heap
page read and write
42A000
unkown
page write copy
401000
unkown
page execute and write copy
2390000
heap
page read and write
42A000
unkown
page write copy
401000
unkown
page execute and write copy
56E000
stack
page read and write
6B6000
heap
page read and write
430000
heap
page read and write
22B0000
heap
page read and write
430000
heap
page read and write
401000
unkown
page execute and write copy
6FF000
heap
page read and write
42A000
unkown
page read and write
6C8000
heap
page read and write
19D000
stack
page read and write
500000
heap
page read and write
42A000
unkown
page read and write
83D000
heap
page read and write
65F000
stack
page read and write
6B0000
heap
page read and write
47E000
stack
page read and write
9FF000
stack
page read and write
7DE000
stack
page read and write
5C7000
heap
page read and write
42E000
unkown
page execute read
480000
heap
page read and write
59E000
stack
page read and write
42A000
unkown
page read and write
401000
unkown
page execute and write copy
42E000
unkown
page execute read
22C0000
heap
page read and write
9C000
stack
page read and write
430000
heap
page read and write
401000
unkown
page execute and write copy
660000
heap
page read and write
9C000
stack
page read and write
2300000
heap
page read and write
646000
heap
page read and write
5FE000
stack
page read and write
9C000
stack
page read and write
7AE000
stack
page read and write
6DA000
heap
page read and write
19D000
stack
page read and write
401000
unkown
page execute and write copy
510000
heap
page read and write
616000
heap
page read and write
5DA000
heap
page read and write
4BE000
heap
page read and write
42E000
unkown
page execute read
6A8000
heap
page read and write
58E000
stack
page read and write
65E000
stack
page read and write
825000
heap
page read and write
42A000
unkown
page read and write
4A0000
heap
page read and write
2330000
heap
page read and write
440000
heap
page read and write
6A7000
heap
page read and write
8EF000
stack
page read and write
598000
heap
page read and write
19D000
stack
page read and write
401000
unkown
page execute and write copy
6D5000
heap
page read and write
4BE000
stack
page read and write
55E000
stack
page read and write
95F000
stack
page read and write
770000
heap
page read and write
1F0000
heap
page read and write
6F0000
heap
page read and write
90E000
stack
page read and write
781000
heap
page read and write
460000
heap
page read and write
42A000
unkown
page write copy
42E000
unkown
page execute read
737000
heap
page read and write
8BF000
stack
page read and write
1F0000
heap
page read and write
537000
heap
page read and write
570000
heap
page read and write
54E000
stack
page read and write
401000
unkown
page execute and write copy
57E000
stack
page read and write
4C6000
heap
page read and write
467000
heap
page read and write
737000
heap
page read and write
4E0000
heap
page read and write
5EF000
heap
page read and write
710000
heap
page read and write
19D000
stack
page read and write
42A000
unkown
page write copy
4EE000
heap
page read and write
500000
heap
page read and write
5B0000
heap
page read and write
57E000
heap
page read and write
660000
heap
page read and write
700000
heap
page read and write
6B8000
heap
page read and write
9C000
stack
page read and write
2190000
heap
page read and write
4B0000
heap
page read and write
711000
heap
page read and write
74F000
heap
page read and write
556000
heap
page read and write
782000
heap
page read and write
19D000
stack
page read and write
9C000
stack
page read and write
42E000
unkown
page execute read
91F000
stack
page read and write
42A000
unkown
page read and write
42A000
unkown
page read and write
480000
heap
page read and write
76F000
stack
page read and write
54E000
stack
page read and write
550000
heap
page read and write
54E000
stack
page read and write
401000
unkown
page execute and write copy
783000
heap
page read and write
1F0000
heap
page read and write
885000
heap
page read and write
7CF000
stack
page read and write
5F0000
heap
page read and write
4BA000
heap
page read and write
747000
heap
page read and write
580000
heap
page read and write
6B7000
heap
page read and write
5B0000
heap
page read and write
42A000
unkown
page read and write
50F000
heap
page read and write
6A7000
heap
page read and write
401000
unkown
page execute and write copy
430000
heap
page read and write
470000
heap
page read and write
1F0000
heap
page read and write
401000
unkown
page execute and write copy
616000
heap
page read and write
640000
heap
page read and write
5AF000
heap
page read and write
1F0000
heap
page read and write
60E000
stack
page read and write
42E000
unkown
page execute read
42A000
unkown
page read and write
401000
unkown
page execute and write copy
42A000
unkown
page read and write
42A000
unkown
page write copy
1D0000
heap
page read and write
42A000
unkown
page write copy
7E6000
heap
page read and write
500000
heap
page read and write
64E000
heap
page read and write
1F0000
heap
page read and write
70A000
heap
page read and write
9C000
stack
page read and write
4AF000
heap
page read and write
9DF000
stack
page read and write
55E000
stack
page read and write
9C000
stack
page read and write
42A000
unkown
page read and write
2260000
heap
page read and write
65F000
stack
page read and write
42E000
unkown
page execute read
19D000
stack
page read and write
19D000
stack
page read and write
9C000
stack
page read and write
8BF000
stack
page read and write
4BE000
stack
page read and write
578000
heap
page read and write
707000
heap
page read and write
42E000
unkown
page execute read
737000
heap
page read and write
1E0000
heap
page read and write
5F0000
heap
page read and write
6D8000
heap
page read and write
500000
heap
page read and write
19D000
stack
page read and write
65F000
stack
page read and write
730000
heap
page read and write
4BE000
stack
page read and write
401000
unkown
page execute and write copy
9C000
stack
page read and write
9C000
stack
page read and write
607000
heap
page read and write
620000
heap
page read and write
42A000
unkown
page write copy
4C6000
heap
page read and write
42A000
unkown
page read and write
467000
heap
page read and write
430000
heap
page read and write
466000
heap
page read and write
590000
heap
page read and write
401000
unkown
page execute and write copy
777000
heap
page read and write
9C000
stack
page read and write
6C7000
heap
page read and write
61E000
heap
page read and write
620000
heap
page read and write
5C0000
heap
page read and write
4EA000
heap
page read and write
22B0000
heap
page read and write
7E0000
heap
page read and write
401000
unkown
page execute and write copy
A0F000
stack
page read and write
750000
heap
page read and write
4FF000
heap
page read and write
401000
unkown
page execute and write copy
571000
heap
page read and write
42E000
unkown
page execute read
400000
unkown
page readonly
8AF000
stack
page read and write
42A000
unkown
page read and write
9C000
stack
page read and write
500000
heap
page read and write
7BA000
heap
page read and write
23A0000
heap
page read and write
737000
heap
page read and write
5E0000
heap
page read and write
4BE000
stack
page read and write
7FF000
stack
page read and write
487000
heap
page read and write
430000
heap
page read and write
42A000
unkown
page read and write
77F000
stack
page read and write
9C000
stack
page read and write
500000
heap
page read and write
59E000
stack
page read and write
22E0000
heap
page read and write
440000
heap
page read and write
4BA000
heap
page read and write
737000
heap
page read and write
606000
heap
page read and write
45E000
heap
page read and write
737000
heap
page read and write
9C000
stack
page read and write
5F6000
heap
page read and write
42E000
unkown
page execute read
22E0000
heap
page read and write
42A000
unkown
page read and write
590000
heap
page read and write
42E000
unkown
page execute read
9C000
stack
page read and write
6AA000
heap
page read and write
42A000
unkown
page write copy
1F0000
heap
page read and write
67E000
heap
page read and write
56E000
heap
page read and write
9C000
stack
page read and write
510000
heap
page read and write
42A000
unkown
page read and write
42E000
unkown
page execute read
1F0000
heap
page read and write
600000
heap
page read and write
1F0000
heap
page read and write
68E000
stack
page read and write
490000
heap
page read and write
616000
heap
page read and write
401000
unkown
page execute and write copy
42A000
unkown
page write copy
62E000
heap
page read and write
42E000
unkown
page execute read
19D000
stack
page read and write
A5F000
stack
page read and write
42A000
unkown
page read and write
6F0000
heap
page read and write
401000
unkown
page execute and write copy
42E000
unkown
page execute read
42E000
unkown
page execute read
42A000
unkown
page write copy
42A000
unkown
page write copy
1F0000
heap
page read and write
9C000
stack
page read and write
5E8000
heap
page read and write
576000
heap
page read and write
520000
heap
page read and write
19D000
stack
page read and write
42E000
unkown
page execute read
1F0000
heap
page read and write
776000
heap
page read and write
637000
heap
page read and write
690000
heap
page read and write
670000
heap
page read and write
42A000
unkown
page write copy
557000
heap
page read and write
5EE000
heap
page read and write
717000
heap
page read and write
9C000
stack
page read and write
65F000
stack
page read and write
6E7000
heap
page read and write
401000
unkown
page execute and write copy
42E000
unkown
page execute read
21B0000
heap
page read and write
466000
heap
page read and write
4E6000
heap
page read and write
19D000
stack
page read and write
717000
heap
page read and write
2220000
heap
page read and write
7CF000
stack
page read and write
86F000
stack
page read and write
4B0000
heap
page read and write
655000
heap
page read and write
1F0000
heap
page read and write
1F0000
heap
page read and write
726000
heap
page read and write
716000
heap
page read and write
540000
heap
page read and write
1F0000
heap
page read and write
9C000
stack
page read and write
401000
unkown
page execute and write copy
9C000
stack
page read and write
580000
heap
page read and write
6FA000
heap
page read and write
1F0000
heap
page read and write
47A000
heap
page read and write
670000
heap
page read and write
70E000
stack
page read and write
430000
heap
page read and write
617000
heap
page read and write
5D0000
heap
page read and write
4AA000
heap
page read and write
7BF000
heap
page read and write
9C000
stack
page read and write
666000
heap
page read and write
476000
heap
page read and write
9C000
stack
page read and write
2360000
heap
page read and write
58E000
stack
page read and write
1F0000
heap
page read and write
687000
heap
page read and write
4B7000
heap
page read and write
83F000
stack
page read and write
2230000
heap
page read and write
680000
heap
page read and write
401000
unkown
page execute and write copy
7AE000
stack
page read and write
520000
heap
page read and write
A1F000
stack
page read and write
1F0000
heap
page read and write
98F000
stack
page read and write
530000
heap
page read and write
666000
heap
page read and write
2340000
heap
page read and write
4BE000
heap
page read and write
500000
heap
page read and write
610000
heap
page read and write
666000
heap
page read and write
19D000
stack
page read and write
600000
heap
page read and write
54E000
stack
page read and write
495000
heap
page read and write
7F6000
heap
page read and write
5D0000
heap
page read and write
6B4000
heap
page read and write
401000
unkown
page execute and write copy
54E000
stack
page read and write
5E0000
heap
page read and write
401000
unkown
page execute and write copy
500000
heap
page read and write
9EF000
stack
page read and write
1F0000
heap
page read and write
1F0000
heap
page read and write
5EF000
heap
page read and write
5E0000
heap
page read and write
19D000
stack
page read and write
42A000
unkown
page read and write
1F0000
heap
page read and write
7EE000
stack
page read and write
47E000
stack
page read and write
42A000
unkown
page write copy
42A000
unkown
page read and write
76F000
stack
page read and write
610000
heap
page read and write
9C000
stack
page read and write
657000
heap
page read and write
57E000
heap
page read and write
42E000
unkown
page execute read
401000
unkown
page execute and write copy
480000
heap
page read and write
58A000
heap
page read and write
42A000
unkown
page read and write
5CE000
stack
page read and write
72F000
stack
page read and write
1F0000
heap
page read and write
59E000
stack
page read and write
7F7000
heap
page read and write
42A000
unkown
page read and write
550000
heap
page read and write
64F000
heap
page read and write
68E000
heap
page read and write
6F6000
heap
page read and write
91F000
stack
page read and write
4B0000
heap
page read and write
7DE000
heap
page read and write
1F0000
heap
page read and write
2210000
heap
page read and write
54E000
stack
page read and write
9C000
stack
page read and write
9C000
stack
page read and write
43A000
heap
page read and write
79E000
stack
page read and write
54E000
stack
page read and write
5A0000
heap
page read and write
42A000
unkown
page write copy
7EE000
heap
page read and write
6B7000
heap
page read and write
686000
heap
page read and write
22D0000
heap
page read and write
7E7000
heap
page read and write
42A000
unkown
page read and write
9C000
stack
page read and write
19D000
stack
page read and write
45F000
heap
page read and write
5FA000
heap
page read and write
707000
heap
page read and write
401000
unkown
page execute and write copy
4E0000
heap
page read and write
19D000
stack
page read and write
2350000
heap
page read and write
9EF000
stack
page read and write
54E000
stack
page read and write
1C0000
heap
page read and write
707000
heap
page read and write
401000
unkown
page execute and write copy
22A0000
heap
page read and write
510000
heap
page read and write
617000
heap
page read and write
808000
heap
page read and write
1F0000
heap
page read and write
5AA000
heap
page read and write
9C000
stack
page read and write
42E000
unkown
page execute read
430000
heap
page read and write
5EE000
heap
page read and write
727000
heap
page read and write
480000
heap
page read and write
500000
heap
page read and write
401000
unkown
page execute and write copy
5DE000
stack
page read and write
42A000
unkown
page read and write
2300000
heap
page read and write
42A000
unkown
page write copy
6AE000
heap
page read and write
9C000
stack
page read and write
6B0000
heap
page read and write
42A000
unkown
page write copy
42A000
unkown
page write copy
42E000
unkown
page execute read
19D000
stack
page read and write
4B0000
heap
page read and write
42A000
unkown
page read and write
19D000
stack
page read and write
19D000
stack
page read and write
42A000
unkown
page read and write
2350000
heap
page read and write
487000
heap
page read and write
520000
heap
page read and write
7BE000
stack
page read and write
756000
heap
page read and write
2340000
heap
page read and write
9C000
stack
page read and write
597000
heap
page read and write
430000
heap
page read and write
430000
heap
page read and write
58E000
stack
page read and write
42A000
unkown
page write copy
19D000
stack
page read and write
555000
heap
page read and write
1F0000
heap
page read and write
44A000
heap
page read and write
9C000
stack
page read and write
6E8000
heap
page read and write
6AE000
stack
page read and write
74A000
heap
page read and write
4C8000
heap
page read and write
19D000
stack
page read and write
42A000
unkown
page write copy
527000
heap
page read and write
69A000
heap
page read and write
6DF000
heap
page read and write
9C000
stack
page read and write
6AF000
stack
page read and write
600000
heap
page read and write
42E000
unkown
page execute read
5F0000
heap
page read and write
7C0000
heap
page read and write
9C000
stack
page read and write
5B7000
heap
page read and write
710000
heap
page read and write
6D5000
heap
page read and write
6FE000
heap
page read and write
4F0000
heap
page read and write
4C0000
heap
page read and write
57E000
heap
page read and write
660000
heap
page read and write
4B0000
heap
page read and write
1F0000
heap
page read and write
A0F000
stack
page read and write
467000
heap
page read and write
5C8000
heap
page read and write
1F0000
heap
page read and write
19D000
stack
page read and write
647000
heap
page read and write
6EA000
heap
page read and write
695000
heap
page read and write
620000
heap
page read and write
820000
heap
page read and write
79E000
stack
page read and write
8EF000
stack
page read and write
83F000
stack
page read and write
6C8000
heap
page read and write
58E000
stack
page read and write
6A7000
heap
page read and write
401000
unkown
page execute and write copy
4AA000
heap
page read and write
630000
heap
page read and write
460000
heap
page read and write
58E000
stack
page read and write
4A7000
heap
page read and write
42A000
unkown
page write copy
4B5000
heap
page read and write
530000
heap
page read and write
510000
heap
page read and write
1E0000
heap
page read and write
9C000
stack
page read and write
60E000
heap
page read and write
42E000
unkown
page execute read
42A000
unkown
page read and write
ABF000
stack
page read and write
42A000
unkown
page write copy
687000
heap
page read and write
686000
heap
page read and write
19D000
stack
page read and write
4C6000
heap
page read and write
690000
heap
page read and write
A0F000
stack
page read and write
807000
heap
page read and write
500000
heap
page read and write
530000
heap
page read and write
1F0000
heap
page read and write
19D000
stack
page read and write
72E000
heap
page read and write
58E000
stack
page read and write
2370000
heap
page read and write
4A0000
heap
page read and write
2210000
heap
page read and write
756000
heap
page read and write
42E000
unkown
page execute read
480000
heap
page read and write
A0F000
stack
page read and write
5BF000
heap
page read and write
610000
heap
page read and write
666000
heap
page read and write
7C8000
heap
page read and write
1F0000
heap
page read and write
72F000
stack
page read and write
43A000
heap
page read and write
6F7000
heap
page read and write
9C000
stack
page read and write
500000
heap
page read and write
42A000
unkown
page write copy
42A000
unkown
page write copy
69A000
heap
page read and write
53A000
heap
page read and write
42E000
unkown
page execute read
42A000
unkown
page write copy
42A000
unkown
page write copy
47E000
stack
page read and write
740000
heap
page read and write
401000
unkown
page execute and write copy
4C0000
heap
page read and write
43A000
heap
page read and write
610000
heap
page read and write
5AE000
stack
page read and write
92E000
stack
page read and write
5F0000
heap
page read and write
42A000
unkown
page write copy
42E000
unkown
page execute read
2270000
heap
page read and write
42A000
unkown
page write copy
42A000
unkown
page read and write
510000
heap
page read and write
60E000
stack
page read and write
500000
heap
page read and write
500000
heap
page read and write
42E000
unkown
page execute read
95F000
stack
page read and write
1F0000
heap
page read and write
19D000
stack
page read and write
580000
heap
page read and write
1F0000
heap
page read and write
4BA000
heap
page read and write
51E000
heap
page read and write
430000
heap
page read and write
67A000
heap
page read and write
5AA000
heap
page read and write
90E000
stack
page read and write
1F0000
heap
page read and write
4F0000
heap
page read and write
660000
heap
page read and write
46A000
heap
page read and write
401000
unkown
page execute and write copy
19D000
stack
page read and write
4CE000
stack
page read and write
767000
heap
page read and write
8DF000
stack
page read and write
44F000
heap
page read and write
42A000
unkown
page read and write
42E000
unkown
page execute read
401000
unkown
page execute and write copy
430000
heap
page read and write
42E000
unkown
page execute read
2270000
heap
page read and write
19D000
stack
page read and write
506000
heap
page read and write
8BF000
stack
page read and write
2360000
heap
page read and write
2360000
heap
page read and write
486000
heap
page read and write
60F000
heap
page read and write
6A7000
heap
page read and write
6B7000
heap
page read and write
47E000
stack
page read and write
401000
unkown
page execute and write copy
47E000
heap
page read and write
4BE000
heap
page read and write
596000
heap
page read and write
9DF000
stack
page read and write
19D000
stack
page read and write
751000
heap
page read and write
8EF000
stack
page read and write
401000
unkown
page execute and write copy
401000
unkown
page execute and write copy
500000
heap
page read and write
4CE000
heap
page read and write
617000
heap
page read and write
686000
heap
page read and write
8DF000
stack
page read and write
57E000
stack
page read and write
488000
heap
page read and write
5DE000
heap
page read and write
6B5000
heap
page read and write
19D000
stack
page read and write
71E000
heap
page read and write
1C0000
heap
page read and write
58E000
stack
page read and write
6CF000
stack
page read and write
42A000
unkown
page read and write
6CF000
stack
page read and write
820000
heap
page read and write
1F0000
heap
page read and write
401000
unkown
page execute and write copy
498000
heap
page read and write
4B0000
heap
page read and write
9EF000
stack
page read and write
1F0000
heap
page read and write
69E000
heap
page read and write
550000
heap
page read and write
470000
heap
page read and write
51F000
heap
page read and write
66F000
stack
page read and write
2390000
heap
page read and write
570000
heap
page read and write
62A000
heap
page read and write
620000
heap
page read and write
42A000
unkown
page write copy
8DE000
stack
page read and write
690000
heap
page read and write
75F000
heap
page read and write
79F000
stack
page read and write
1F0000
heap
page read and write
440000
heap
page read and write
8AF000
stack
page read and write
6AF000
heap
page read and write
42E000
unkown
page execute read
2190000
heap
page read and write
A1F000
stack
page read and write
42E000
unkown
page execute read
9C000
stack
page read and write
6A6000
heap
page read and write
401000
unkown
page execute and write copy
8DE000
stack
page read and write
1F0000
heap
page read and write
47E000
stack
page read and write
1F0000
heap
page read and write
430000
heap
page read and write
741000
heap
page read and write
750000
heap
page read and write
42A000
unkown
page read and write
19D000
stack
page read and write
2240000
heap
page read and write
1F0000
heap
page read and write
42A000
unkown
page write copy
1F0000
heap
page read and write
4D6000
heap
page read and write
8DE000
stack
page read and write
5FE000
stack
page read and write
596000
heap
page read and write
490000
heap
page read and write
487000
heap
page read and write
63E000
heap
page read and write
66E000
heap
page read and write
79E000
stack
page read and write
23D0000
heap
page read and write
5F6000
heap
page read and write
77F000
stack
page read and write
42E000
unkown
page execute read
6F6000
heap
page read and write
401000
unkown
page execute and write copy
580000
heap
page read and write
686000
heap
page read and write
42A000
unkown
page write copy
5DA000
heap
page read and write
19D000
stack
page read and write
6D7000
heap
page read and write
401000
unkown
page execute and write copy
5AE000
heap
page read and write
430000
heap
page read and write
66F000
stack
page read and write
747000
heap
page read and write
430000
heap
page read and write
591000
heap
page read and write
4B0000
heap
page read and write
5D0000
heap
page read and write
510000
heap
page read and write
42E000
unkown
page execute read
1F0000
heap
page read and write
5D5000
heap
page read and write
430000
heap
page read and write
776000
heap
page read and write
44A000
heap
page read and write
42E000
unkown
page execute read
44A000
heap
page read and write
6BE000
heap
page read and write
2180000
heap
page read and write
42E000
unkown
page execute read
667000
heap
page read and write
42E000
unkown
page execute read
430000
heap
page read and write
1F0000
heap
page read and write
9C000
stack
page read and write
686000
heap
page read and write
42E000
unkown
page execute read
430000
heap
page read and write
42A000
unkown
page write copy
500000
heap
page read and write
666000
heap
page read and write
42A000
unkown
page write copy
401000
unkown
page execute and write copy
9FF000
stack
page read and write
4A7000
heap
page read and write
1F0000
heap
page read and write
401000
unkown
page execute and write copy
9EF000
stack
page read and write
42E000
unkown
page execute read
585000
heap
page read and write
A5F000
stack
page read and write
73F000
heap
page read and write
19D000
stack
page read and write
42A000
unkown
page read and write
63E000
heap
page read and write
1F0000
heap
page read and write
55E000
stack
page read and write
516000
heap
page read and write
510000
heap
page read and write
19D000
stack
page read and write
6E6000
heap
page read and write
500000
heap
page read and write
5CE000
stack
page read and write
500000
heap
page read and write
727000
heap
page read and write
42A000
unkown
page read and write
737000
heap
page read and write
85F000
stack
page read and write
517000
heap
page read and write
4B0000
heap
page read and write
7CE000
heap
page read and write
4E0000
heap
page read and write
736000
heap
page read and write
21D0000
heap
page read and write
1F0000
heap
page read and write
69E000
stack
page read and write
6C0000
heap
page read and write
530000
heap
page read and write
764000
heap
page read and write
42A000
unkown
page read and write
8CF000
stack
page read and write
ACF000
stack
page read and write
510000
heap
page read and write
42E000
unkown
page execute read
2260000
heap
page read and write
586000
heap
page read and write
500000
heap
page read and write
42A000
unkown
page write copy
6A8000
heap
page read and write
42E000
unkown
page execute read
440000
heap
page read and write
401000
unkown
page execute and write copy
2360000
heap
page read and write
22A0000
heap
page read and write
81F000
stack
page read and write
4A0000
heap
page read and write
71E000
heap
page read and write
55E000
stack
page read and write
21D0000
heap
page read and write
71E000
heap
page read and write
630000
heap
page read and write
42A000
unkown
page write copy
42A000
unkown
page write copy
62F000
heap
page read and write
66E000
heap
page read and write
6B6000
heap
page read and write
50E000
heap
page read and write
7A0000
heap
page read and write
5DA000
heap
page read and write
7AE000
heap
page read and write
8FF000
stack
page read and write
500000
heap
page read and write
66E000
heap
page read and write
1F0000
heap
page read and write
480000
heap
page read and write
9C000
stack
page read and write
6CE000
stack
page read and write
500000
heap
page read and write
19D000
stack
page read and write
656000
heap
page read and write
656000
heap
page read and write
51E000
heap
page read and write
7FF000
stack
page read and write
2380000
heap
page read and write
617000
heap
page read and write
42A000
unkown
page write copy
430000
heap
page read and write
401000
unkown
page execute and write copy
646000
heap
page read and write
44E000
heap
page read and write
2200000
heap
page read and write
47E000
stack
page read and write
4A0000
heap
page read and write
7BA000
heap
page read and write
1F0000
heap
page read and write
6E2000
heap
page read and write
1F0000
heap
page read and write
6A7000
heap
page read and write
7E6000
heap
page read and write
42E000
unkown
page execute read
9C000
stack
page read and write
63E000
heap
page read and write
806000
heap
page read and write
62E000
heap
page read and write
1F0000
heap
page read and write
5F0000
heap
page read and write
1F0000
heap
page read and write
51E000
heap
page read and write
42A000
unkown
page write copy
401000
unkown
page execute and write copy
8BF000
stack
page read and write
42E000
unkown
page execute read
91F000
stack
page read and write
65E000
heap
page read and write
A4F000
stack
page read and write
42A000
unkown
page read and write
401000
unkown
page execute and write copy
8AF000
stack
page read and write
1E0000
heap
page read and write
56F000
heap
page read and write
54E000
stack
page read and write
5F0000
heap
page read and write
7DE000
stack
page read and write
510000
heap
page read and write
560000
heap
page read and write
8DF000
stack
page read and write
547000
heap
page read and write
42A000
unkown
page read and write
510000
heap
page read and write
6CA000
heap
page read and write
42A000
unkown
page write copy
59E000
stack
page read and write
550000
heap
page read and write
666000
heap
page read and write
42E000
unkown
page execute read
7EF000
stack
page read and write
61A000
heap
page read and write
9C000
stack
page read and write
2260000
heap
page read and write
42A000
unkown
page write copy
637000
heap
page read and write
8DF000
stack
page read and write
636000
heap
page read and write
401000
unkown
page execute and write copy
457000
heap
page read and write
4BA000
heap
page read and write
4B0000
heap
page read and write
9C000
stack
page read and write
57E000
stack
page read and write
470000
heap
page read and write
5BE000
heap
page read and write
401000
unkown
page execute and write copy
8FE000
stack
page read and write
7CE000
stack
page read and write
6E0000
heap
page read and write
19D000
stack
page read and write
7E0000
heap
page read and write
42A000
unkown
page write copy
55E000
stack
page read and write
47E000
heap
page read and write
65E000
stack
page read and write
2410000
heap
page read and write
42A000
unkown
page write copy
510000
heap
page read and write
1F0000
heap
page read and write
19D000
stack
page read and write
54E000
stack
page read and write
9EF000
stack
page read and write
9BF000
stack
page read and write
7FE000
stack
page read and write
65F000
heap
page read and write
631000
heap
page read and write
19D000
stack
page read and write
61E000
heap
page read and write
22C0000
heap
page read and write
90E000
stack
page read and write
65E000
stack
page read and write
430000
heap
page read and write
9C000
stack
page read and write
430000
heap
page read and write
19D000
stack
page read and write
1E0000
heap
page read and write
9C000
stack
page read and write
42A000
unkown
page write copy
59E000
stack
page read and write
846000
heap
page read and write
9C000
stack
page read and write
6C0000
heap
page read and write
467000
heap
page read and write
5B0000
heap
page read and write
58E000
stack
page read and write
4BE000
stack
page read and write
42A000
unkown
page write copy
42A000
unkown
page write copy
401000
unkown
page execute and write copy
9FF000
stack
page read and write
456000
heap
page read and write
42A000
unkown
page read and write
700000
heap
page read and write
42E000
unkown
page execute read
7F6000
heap
page read and write
616000
heap
page read and write
A1F000
stack
page read and write
4CF000
heap
page read and write
46F000
heap
page read and write
42A000
unkown
page read and write
706000
heap
page read and write
516000
heap
page read and write
697000
heap
page read and write
42E000
unkown
page execute read
401000
unkown
page execute and write copy
401000
unkown
page execute and write copy
4FA000
heap
page read and write
9C000
stack
page read and write
2240000
heap
page read and write
22F0000
heap
page read and write
50E000
stack
page read and write
9FF000
stack
page read and write
42A000
unkown
page write copy
1F0000
heap
page read and write
50E000
heap
page read and write
401000
unkown
page execute and write copy
6F5000
heap
page read and write
6DA000
heap
page read and write
726000
heap
page read and write
800000
heap
page read and write
785000
heap
page read and write
4C7000
heap
page read and write
401000
unkown
page execute and write copy
6FA000
heap
page read and write
401000
unkown
page execute and write copy
2210000
heap
page read and write
42A000
unkown
page read and write
2200000
heap
page read and write
4F6000
heap
page read and write
9C000
stack
page read and write
42E000
unkown
page execute read
4C6000
heap
page read and write
2240000
heap
page read and write
73F000
heap
page read and write
8EF000
stack
page read and write
42A000
unkown
page write copy
19D000
stack
page read and write
8EE000
stack
page read and write
4E0000
heap
page read and write
44E000
heap
page read and write
19D000
stack
page read and write
19D000
stack
page read and write
65F000
stack
page read and write
597000
heap
page read and write
6DE000
heap
page read and write
9C000
stack
page read and write
42A000
unkown
page write copy
1F0000
heap
page read and write
1F0000
heap
page read and write
5F7000
heap
page read and write
5D7000
heap
page read and write
9FF000
stack
page read and write
570000
heap
page read and write
5C0000
heap
page read and write
19D000
stack
page read and write
7CE000
stack
page read and write
71E000
heap
page read and write
656000
heap
page read and write
708000
heap
page read and write
486000
heap
page read and write
90E000
stack
page read and write
93F000
stack
page read and write
5F0000
heap
page read and write
2250000
heap
page read and write
4C0000
heap
page read and write
22B0000
heap
page read and write
8CF000
stack
page read and write
4CA000
heap
page read and write
5DA000
heap
page read and write
2390000
heap
page read and write
2300000
heap
page read and write
89F000
stack
page read and write
A5F000
stack
page read and write
66F000
heap
page read and write
430000
heap
page read and write
1F0000
heap
page read and write
58E000
stack
page read and write
9C000
stack
page read and write
1F0000
heap
page read and write
700000
heap
page read and write
4E7000
heap
page read and write
530000
heap
page read and write
700000
heap
page read and write
42A000
unkown
page write copy
70E000
heap
page read and write
44E000
heap
page read and write
727000
heap
page read and write
500000
heap
page read and write
9C000
stack
page read and write
19D000
stack
page read and write
6F7000
heap
page read and write
637000
heap
page read and write
48E000
heap
page read and write
1F0000
heap
page read and write
9C000
stack
page read and write
19D000
stack
page read and write
4FE000
heap
page read and write
45A000
heap
page read and write
42E000
unkown
page execute read
500000
heap
page read and write
48F000
heap
page read and write
4D7000
heap
page read and write
637000
heap
page read and write
720000
heap
page read and write
500000
heap
page read and write
737000
heap
page read and write
42A000
unkown
page read and write
4F0000
heap
page read and write
5F7000
heap
page read and write
19D000
stack
page read and write
42A000
unkown
page read and write
530000
heap
page read and write
19D000
stack
page read and write
4B7000
heap
page read and write
42A000
unkown
page read and write
768000
heap
page read and write
22A0000
heap
page read and write
42E000
unkown
page execute read
84F000
stack
page read and write
42A000
unkown
page write copy
42A000
unkown
page read and write
19D000
stack
page read and write
A2F000
stack
page read and write
9C000
stack
page read and write
66A000
heap
page read and write
430000
heap
page read and write
42A000
unkown
page read and write
54E000
stack
page read and write
6E0000
heap
page read and write
2260000
heap
page read and write
23A0000
heap
page read and write
92F000
stack
page read and write
5DE000
stack
page read and write
19D000
stack
page read and write
506000
heap
page read and write
19D000
stack
page read and write
6F7000
heap
page read and write
500000
heap
page read and write
6AA000
heap
page read and write
42A000
unkown
page read and write
680000
heap
page read and write
7F7000
heap
page read and write
42A000
unkown
page read and write
6B6000
heap
page read and write
500000
heap
page read and write
440000
heap
page read and write
550000
heap
page read and write
520000
heap
page read and write
680000
heap
page read and write
616000
heap
page read and write
6C7000
heap
page read and write
7AE000
heap
page read and write
401000
unkown
page execute and write copy
4C0000
heap
page read and write
19D000
stack
page read and write
5CE000
stack
page read and write
510000
heap
page read and write
90F000
stack
page read and write
401000
unkown
page execute and write copy
4D7000
heap
page read and write
55E000
stack
page read and write
641000
heap
page read and write
67A000
heap
page read and write
19D000
stack
page read and write
620000
heap
page read and write
4A7000
heap
page read and write
44E000
heap
page read and write
6D5000
heap
page read and write
42A000
unkown
page read and write
9C000
stack
page read and write
42A000
unkown
page read and write
54E000
stack
page read and write
510000
heap
page read and write
5F0000
heap
page read and write
867000
heap
page read and write
1F0000
heap
page read and write
5A0000
heap
page read and write
1F0000
heap
page read and write
5BE000
stack
page read and write
61A000
heap
page read and write
480000
heap
page read and write
42E000
unkown
page execute read
6AE000
heap
page read and write
9C000
stack
page read and write
42A000
unkown
page write copy
840000
heap
page read and write
42A000
unkown
page read and write
71A000
heap
page read and write
5CA000
heap
page read and write
621000
heap
page read and write
9C000
stack
page read and write
8EF000
stack
page read and write
401000
unkown
page execute and write copy
6A0000
heap
page read and write
717000
heap
page read and write
497000
heap
page read and write
A2F000
stack
page read and write
637000
heap
page read and write
846000
heap
page read and write
580000
heap
page read and write
42A000
unkown
page write copy
42E000
unkown
page execute read
677000
heap
page read and write
500000
heap
page read and write
57A000
heap
page read and write
4BE000
stack
page read and write
635000
heap
page read and write
93F000
stack
page read and write
616000
heap
page read and write
9EF000
stack
page read and write
500000
heap
page read and write
47E000
stack
page read and write
22D0000
heap
page read and write
19D000
stack
page read and write
4EE000
heap
page read and write
42A000
unkown
page write copy
19D000
stack
page read and write
5AF000
heap
page read and write
55E000
heap
page read and write
650000
heap
page read and write
1F0000
heap
page read and write
42A000
unkown
page read and write
42E000
unkown
page execute read
66E000
stack
page read and write
85F000
stack
page read and write
6EE000
heap
page read and write
42A000
unkown
page read and write
42A000
unkown
page write copy
7C7000
heap
page read and write
42A000
unkown
page write copy
19D000
stack
page read and write
22B0000
heap
page read and write
2350000
heap
page read and write
70E000
heap
page read and write
8DF000
stack
page read and write
A3F000
stack
page read and write
42A000
unkown
page write copy
5B0000
heap
page read and write
42A000
unkown
page write copy
5C7000
heap
page read and write
19D000
stack
page read and write
2350000
heap
page read and write
55E000
heap
page read and write
2330000
heap
page read and write
4E0000
heap
page read and write
2220000
heap
page read and write
9C000
stack
page read and write
4E6000
heap
page read and write
9C000
stack
page read and write
7AF000
stack
page read and write
486000
heap
page read and write
430000
heap
page read and write
42A000
unkown
page write copy
1F0000
heap
page read and write
19D000
stack
page read and write
2300000
heap
page read and write
530000
heap
page read and write
61E000
heap
page read and write
4AE000
heap
page read and write
557000
heap
page read and write
1F0000
heap
page read and write
8AF000
stack
page read and write
6E7000
heap
page read and write
4D7000
heap
page read and write
500000
heap
page read and write
4CE000
stack
page read and write
9C000
stack
page read and write
21D0000
heap
page read and write
510000
heap
page read and write
510000
heap
page read and write
73E000
heap
page read and write
42A000
unkown
page write copy
550000
heap
page read and write
1F0000
heap
page read and write
75F000
stack
page read and write
401000
unkown
page execute and write copy
600000
heap
page read and write
738000
heap
page read and write
1F0000
heap
page read and write
47E000
stack
page read and write
5EA000
heap
page read and write
62F000
heap
page read and write
42A000
unkown
page read and write
47E000
stack
page read and write
42E000
unkown
page execute read
401000
unkown
page execute and write copy
42A000
unkown
page read and write
46E000
heap
page read and write
42E000
unkown
page execute read
19D000
stack
page read and write
19D000
stack
page read and write
9C000
stack
page read and write
8EF000
stack
page read and write
430000
heap
page read and write
9C000
stack
page read and write
ABF000
stack
page read and write
73E000
heap
page read and write
750000
heap
page read and write
580000
heap
page read and write
71F000
stack
page read and write
610000
heap
page read and write
9C000
stack
page read and write
466000
heap
page read and write
42E000
unkown
page execute read
8FF000
stack
page read and write
42E000
unkown
page execute read
42A000
unkown
page write copy
490000
heap
page read and write
19D000
stack
page read and write
7E5000
heap
page read and write
21B0000
heap
page read and write
42A000
unkown
page read and write
1F0000
heap
page read and write
22B0000
heap
page read and write
6A6000
heap
page read and write
68E000
heap
page read and write
4CA000
heap
page read and write
7EF000
heap
page read and write
19D000
stack
page read and write
47E000
stack
page read and write
A2F000
stack
page read and write
42A000
unkown
page read and write
42A000
unkown
page write copy
5BA000
heap
page read and write
42A000
unkown
page read and write
796000
heap
page read and write
6A1000
heap
page read and write
9EF000
stack
page read and write
1F0000
heap
page read and write
1F0000
heap
page read and write
401000
unkown
page execute and write copy
42A000
unkown
page write copy
6FF000
stack
page read and write
8DE000
stack
page read and write
42A000
unkown
page write copy
7D0000
heap
page read and write
42A000
unkown
page read and write
42A000
unkown
page read and write
701000
heap
page read and write
2440000
heap
page read and write
54E000
stack
page read and write
5DA000
heap
page read and write
42E000
unkown
page execute read
42A000
unkown
page read and write
42A000
unkown
page read and write
42A000
unkown
page write copy
401000
unkown
page execute and write copy
500000
heap
page read and write
1F0000
heap
page read and write
19D000
stack
page read and write
6C7000
heap
page read and write
5E7000
heap
page read and write
8EE000
stack
page read and write
A4F000
stack
page read and write
738000
heap
page read and write
55E000
stack
page read and write
There are 3930 hidden memdumps, click here to show them.